Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1229941000387170304/1229943091469750383/808grabber.zip?ex=663184c4&is=661f0fc4&hm=8e51e8d8c0d0be74b8ec478126c3631e7212df1a812f56651a48ec1a8bc229a6&

  2. IP

    162.159.135.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-17 00:32:36

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1229941000387170304/1229943091469750383/808grabber.zip?ex=663184c4&is=661f0fc4&hm=8e51e8d8c0d0be74b8ec478126c3631e7212df1a812f56651a48ec1a8bc229a6&

  2. IP

    162.159.130.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    2.4 kB (2393 bytes)

  2. Hash

    71751d31508e984e4ff4f74fa9b8228b

    a27d4b809aa0f144e5b541f58127221fb8fb07b9

  1. Archive (4)

  2. FilenameMd5File type
    crazy grabber.lnk
    a2f48ce6cb5368de104432f4ceeb2564
    MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 16 22:36:30 2024, mtime=Tue Apr 16 22:40:44 2024, atime=Tue Apr 16 22:40:25 2024, length=53085, window=hide
    install.lnk
    864438fbc8edd48b851d1feea20c660e
    MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Normal, ctime=Tue Apr 16 22:36:30 2024, mtime=Tue Apr 16 22:38:29 2024, atime=Tue Apr 16 20:24:41 2024, length=214, window=hide
    please read the readme!.txt
    a352910dcec1578abe1ab02c77ebc8b8
    ASCII text, with CRLF line terminators
    readme!.txt
    a603793489e57943da5642c13ba8070d
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies scripting artefacts in shortcut (LNK) files.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1229941000387170304/1229943091469750383/808grabber.zip?ex=663184c4&is=661f0fc4&hm=8e51e8d8c0d0be74b8ec478126c3631e7212df1a812f56651a48ec1a8bc229a6&
162.159.130.233200 OK2.4 kB