Report Overview

  1. Submitted URL

    file-drop.cc/D/460925/BrawlB0t.exe

  2. IP

    104.21.95.172

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-20 13:49:12

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    1

  3. Threat Detection Systems

    7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
file-drop.ccunknown2024-03-222024-03-232024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP 172.67.146.180

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumfile-drop.cc/D/460925/BrawlB0t.exeDetect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns
SeverityIndicatorAlert
mediumfile-drop.ccSinkholed

Quad9 DNS
SeverityIndicatorAlert
mediumfile-drop.ccSinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    file-drop.cc/D/460925/BrawlB0t.exe

  2. IP

    172.67.146.180

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    67 kB (66560 bytes)

  2. Hash

    3a71554c4a1b0665bbe63c19e85b5182

    9d90887ff8b7b160ffc7b764de8ee813db880a89

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
file-drop.cc/D/460925/BrawlB0t.exe
172.67.146.180200 OK67 kB