Report Overview

  1. Submitted URL

    refinetweaks.shop/ugl/latest/freeugl/OBS-Studio-30.0-Full-Installer-x64(1).exe

  2. IP

    172.67.195.111

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-03-29 08:53:30

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
refinetweaks.shopunknown2024-01-122024-01-122024-03-11

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumrefinetweaks.shop/ugl/latest/freeugl/OBS-Studio-30.0-Full-Installer-x64(1).exeDetects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    refinetweaks.shop/ugl/latest/freeugl/OBS-Studio-30.0-Full-Installer-x64(1).exe

  2. IP

    104.21.84.173

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32+ executable (console) x86-64, for MS Windows, 6 sections

    Size

    1.4 MB (1392640 bytes)

  2. Hash

    d856b1a367b6ae1ae9dc7d8644169fbf

    a305926ab738d134b630a867fabcaf27811aa95f

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
refinetweaks.shop/ugl/latest/freeugl/OBS-Studio-30.0-Full-Installer-x64(1).exe
104.21.84.173200 OK1.4 MB