Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1186872669405192272/1223106436209574029/RDR2_FamilyMenu_1_2_4.zip?ex=6618a5a2&is=660630a2&hm=33ebe9380b05abc45855c09609e131d0c1901bdbd9456fd8c933026d2207715b&

  2. IP

    162.159.134.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-03-29 09:50:56

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-03-28

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1186872669405192272/1223106436209574029/RDR2_FamilyMenu_1_2_4.zip?ex=6618a5a2&is=660630a2&hm=33ebe9380b05abc45855c09609e131d0c1901bdbd9456fd8c933026d2207715b&

  2. IP

    162.159.133.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    8.9 MB (8926543 bytes)

  2. Hash

    81af557456b1d1b00f2f3b494268a315

    aa4bf88343414874bda82844c6764e3ecc2d4dfd

  1. Archive (12)

  2. FilenameMd5File type
    Fonts.ttf
    f7e50c657b3d1ec86faee2f6e5daa2f8
    TrueType Font data, 18 tables, 1st "FFTM", name offset 0x9a46cc
    Hotkeys.json
    bd48b4942dde4324869d283ef75b2c13
    JSON text data
    de_DE.json
    cc8db67e338ef9c6d7280c39d63ddb9c
    JSON text data
    en_GB.json
    dde504dca438809f1da786da3c5d1d65
    JSON text data
    ru_RU.json
    6dfca210dfacaface43ae6791b11c0cc
    JSON text data
    tr_TR.json
    d17fa0e778188a84ba71530b93ad057a
    JSON text data
    zh_CN.json
    1ead3dc58662b661e1747bf857419dc9
    JSON text data
    zh_TW.json
    561b5e2c50858fabc7cf6edac596ed7e
    JSON text data
    Settings.json
    0d1a5ba711e9cb85c899a687c0391180
    JSON text data
    FamilyRes.ytd
    d49ba5d9e725e95269b79f0d465fde59
    data
    FamilyRDR2.dll
    74085c1a3cd110e3214ff818b3a161c3
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 3 sections
    RDR2Loader.exe
    4f9cbb8c16e5fb386ccb10ce562fcfb6
    PE32+ executable (console) x86-64, for MS Windows, 7 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1186872669405192272/1223106436209574029/RDR2_FamilyMenu_1_2_4.zip?ex=6618a5a2&is=660630a2&hm=33ebe9380b05abc45855c09609e131d0c1901bdbd9456fd8c933026d2207715b&
162.159.133.233200 OK8.9 MB