GitHub - infinitumitlabs/Karakurt-Hacking-Team-CTI: IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure By seraysaglam Archived: 2026-04-05 13:38:13 UTC Karakurt Hacking Team Indicators of Compromise (IOC) These IOCs were released as part of CTI team research by Infinitum IT. The full report is available here One of the most valuable pieces of threat intelligence we discovered during this CTI investigation was the the IP address of the data storage and Command and Control Servers used by Karakurt / Conti. Domain IP karakurt.co 209.222.98.19 stok-061153.stokermate.com 104.238.61.153 Real IP Address of Onion site used by Karakurt Hacking Team as a public leak page Onion site IP lhxxtrqraokn63f3nubhbjrzxkrgduq3qogp3yr424tkpvh3z7n4kcyd.onion 104.243.34.214 Karakurt Leak Site https://github.com/infinitumitlabs/Karakurt-Hacking-Team-CTI Page 1 of 4 Following table contains the authentication logs of the subject Karakurt servers with IP 209.222.98.19 and 104.238.61.153 Detected TCP Connections on Karakurt Servers 45.8.119.60 212.220.115.145 5.45.83.32 31.14.40.64 95.170.133.54 1.116.139.11 45.141.84.126 185.5.251.35 49.232.93.149 https://github.com/infinitumitlabs/Karakurt-Hacking-Team-CTI Page 2 of 4 Detected TCP Connections on Karakurt Servers 61.177.173.17 80.93.19.227 139.219.4.103 61.19.125.2 159.65.140.76 23.99.177.202 109.169.14.109 104.243.34.214 37.252.0.143 46.166.143.114 Durring our CTI research on Karakurt / Conti Servers we are able to identify the use of SOCKS proxy pivoting technique with a open source tool called Ligolo-ng against multiple victims. Following table contains the Ligolo-ng Agent and Command and Control Server used by Karakurt Hacking Team Members Ligolo-ng Agent and Command and Control Servers 104.194.9.238/download/lig.ext 104.194.9.238:455/download/lig2.ext 104.238.61.153 Source Code of Data Leak Page Used by Karakurt Threat Group [ Update - Published ] When we connected to the Karakurt Blog Web Server, we saw that all of the stolen data had been categorized by a Software that was being developed by Karakurt members. https://github.com/infinitumitlabs/Karakurt-Hacking-Team-CTI Page 3 of 4 Cobalt Strike Server and Malware Samples [Update - Published] This data has been obtanied from an Encrypted ZIP folder inside Karakurt C2 Server IP Domian Name 108.177.235.127 kisizo[.]com VT Link https://www.virustotal.com/gui/file/b7ae3b6f2c04a8d05478509b5047bf50bd880d32125923f093b2ea65fe48fac1/relations https://www.virustotal.com/gui/file/8cfdb99185fba9abd91d915425826ca9c6ce360fe68f4c8430c358ceab0acf24/relations Source: https://github.com/infinitumitlabs/Karakurt-Hacking-Team-CTI https://github.com/infinitumitlabs/Karakurt-Hacking-Team-CTI Page 4 of 4