Report Overview

  1. Submitted URL

    bshd1.shop/KDAmlIGd/file4232024.exe

  2. IP

    104.21.33.24

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-23 09:22:47

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
bshd1.shopunknown2024-03-012024-03-012024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumbshd1.shop/KDAmlIGd/file4232024.exeDetects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
mediumbshd1.shop/KDAmlIGd/file4232024.exeIdentifies compiled AutoIT script (as EXE).

Files detected

  1. URL

    bshd1.shop/KDAmlIGd/file4232024.exe

  2. IP

    104.21.33.24

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Size

    1.2 MB (1204736 bytes)

  2. Hash

    44b04d776db9d460be36d91abd7cbf73

    37c1aad991e87ecf247c50c9ed5a27970304d60e

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
bshd1.shop/KDAmlIGd/file4232024.exe
104.21.33.24200 OK1.2 MB