Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1229123446324330579/1232334069782675567/Peki_Spoofer_V4.exe?ex=662bb709&is=662a6589&hm=b520a7ab5ffa9eaaefe185512b7534114d15f612114038b048280aec8385aef3&

  2. IP

    162.159.129.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-25 17:39:24

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-04-24
aus5.mozilla.org25481998-01-242015-10-272024-04-24

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumcdn.discordapp.com/attachments/1229123446324330579/1232334069782675567/Peki_Spoofer_V4.exe?ex=662bb709&is=662a6589&hm=b520a7ab5ffa9eaaefe185512b7534114d15f612114038b048280aec8385aef3&Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1229123446324330579/1232334069782675567/Peki_Spoofer_V4.exe?ex=662bb709&is=662a6589&hm=b520a7ab5ffa9eaaefe185512b7534114d15f612114038b048280aec8385aef3&

  2. IP

    162.159.134.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32+ executable (console) x86-64, for MS Windows, 6 sections

    Size

    35 kB (34816 bytes)

  2. Hash

    b2378bf2012913426e94a6a884b90bfb

    c82103a193313f632d5d780814ee351b195cdbd7

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
cdn.discordapp.com/attachments/1229123446324330579/1232334069782675567/Peki_Spoofer_V4.exe?ex=662bb709&is=662a6589&hm=b520a7ab5ffa9eaaefe185512b7534114d15f612114038b048280aec8385aef3&
162.159.134.233200 OK35 kB
aus5.mozilla.org/update/3/GMP/111.0a1/20240129201730/Linux_x86_64-gcc3/null/default/Linux%205.15.0-102-generic%20(GTK%203.24.37%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201 444 B