Report Overview

  1. Submitted URL

    yarasports.com/inquiry/Scandoc1114.exe

  2. IP

    37.27.98.198

    ASN

    #24940 Hetzner Online GmbH

  3. Submitted

    2024-04-16 11:22:20

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
yarasports.comunknown2018-10-092019-10-292024-04-12

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumyarasports.com/inquiry/Scandoc1114.exeDetects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
mediumyarasports.com/inquiry/Scandoc1114.exeIdentifies compiled AutoIT script (as EXE).

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    yarasports.com/inquiry/Scandoc1114.exe

  2. IP

    37.27.98.198

  3. ASN

    #24940 Hetzner Online GmbH

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Size

    636 kB (635786 bytes)

  2. Hash

    1028a0939cb0ce3475e93dcab08ebba8

    cabea9297663f49fc202440b4744c2e68f34e85b

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
yarasports.com/inquiry/Scandoc1114.exe
37.27.98.198200 OK636 kB