Report Overview

  1. Submitted URL

    dw23.malavida.com/dwn/bce37756e7313e3074ed1e025447e2b14698203c67b81310cf6c366d6b475454/79040-ToYcon.zip

  2. IP

    5.145.168.48

    ASN

    #39020 Comvive Servidores S.L.

  3. Submitted

    2024-04-19 17:58:28

    Access

    public

  4. Website Title

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
dw23.malavida.comunknown2001-05-312021-09-202024-04-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    dw23.malavida.com/dwn/bce37756e7313e3074ed1e025447e2b14698203c67b81310cf6c366d6b475454/79040-ToYcon.zip

  2. IP

    5.145.168.48

  3. ASN

    #39020 Comvive Servidores S.L.

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    274 kB (273904 bytes)

  2. Hash

    b3c58ecca3f433c3fc0086532419b356

    2988fadb2e5aa5105b5a1e5024ba14066afdc7fc

  1. Archive (9)

  2. FilenameMd5File type
    Changelog.txt
    36d1cbb4c4735a17fc0b99e98f725ce0
    ASCII text, with CRLF line terminators
    config.ini
    503be0afe5ec56401ff50c5d354c48ae
    ASCII text, with CRLF line terminators
    English.lng
    9e151f3f0ad37bd045b45a644b687af8
    ASCII text, with CRLF line terminators
    French.lng
    1e160018443611935dcac0d063fcf863
    ISO-8859 text, with CRLF line terminators
    license.txt
    0d3e064ebbe1e133ac125d1056a939f6
    ASCII text, with CRLF line terminators
    Dock.toy
    8921b060867a754780eceb5bd474f168
    ASCII text, with CRLF line terminators
    Vista.toy
    193e88788b744d43c3ed95280ebf3eee
    ASCII text, with CRLF line terminators
    Xp.toy
    74669b14cd3b60cf2570b6d4ac2a42f1
    ASCII text, with CRLF line terminators
    ToYcon.exe
    6cf7eb5d6a39b07e09a9514cd10c22c9
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_stackstrings
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
dw23.malavida.com/dwn/bce37756e7313e3074ed1e025447e2b14698203c67b81310cf6c366d6b475454/79040-ToYcon.zip
5.145.168.48 274 kB