Report Overview

  1. Submitted URL

    fs2.grafixdrive.com/token/download/tempuser/10dt/Random_Flow_v3.0.1.zip?download_token=b6d65080acf3f52ce9c258db57d424aef768e2166e62e85c6d369e5a3f1f271d

  2. IP

    65.21.93.86

    ASN

    #24940 Hetzner Online GmbH

  3. Submitted

    2024-04-24 12:11:45

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
fs2.grafixdrive.comunknown2020-05-282023-03-152024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    fs2.grafixdrive.com/token/download/tempuser/10dt/Random_Flow_v3.0.1.zip?download_token=b6d65080acf3f52ce9c258db57d424aef768e2166e62e85c6d369e5a3f1f271d

  2. IP

    65.21.93.86

  3. ASN

    #24940 Hetzner Online GmbH

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    6.7 MB (6714634 bytes)

  2. Hash

    d02af8a7300f07f2221e067a41be144a

    25bfb5ebc1aa9793a81492ff586387228edaeba3

  1. Archive (26)

  2. FilenameMd5File type
    __init__.py
    9f0e9976b454bc410b0dfa0ec3e9d5ac
    Python script, ASCII text executable, with CRLF line terminators
    LICENSE
    e62637ea8a114355b985fd86c9ffbd6e
    ASCII text, with CRLF line terminators
    read_me.txt
    9fb5dce65891be52ec2f55fd5539e68b
    ASCII text, with CRLF line terminators
    cable_coupling01.stl
    f3c662efe013b7dc6671590e0aebc113
    data
    cable_coupling02.stl
    d59bb8b8e31ede65d4a12a3bb4b8ea61
    data
    flange01.stl
    6c59fa13be2ff4dd54eb43f9ef528921
    data
    flange02.stl
    8b4b8d5cc507f7e5e34a6845bdc52f30
    data
    flange03_hvy.stl
    4bb380b9d2bf41ec7992646df6f0dcbb
    data
    flange04_hvy.stl
    5e90db8cb6fc50dfb4f15956cac14838
    data
    flange05_caps.stl
    34b351dc19c421e0e11472c99f24ee28
    data
    flange06_caps.stl
    f2169f918da9574afb6c993bc71e5203
    data
    grunge_shaders_01.blend
    6cae80ab8e5434529860ab62c530214b
    Blender3D, saved as 64-bits little endian with version 4.00
    operators.py
    2144a8e916739b945028e4aad937dcac
    Python script, ASCII text executable, with CRLF line terminators
    preferences.py
    2dcdf07685d142fbbc868b6e1106b3db
    Python script, ASCII text executable, with CRLF line terminators
    captive01.stl
    f1fd38c09bc30ee5949bc61abcb6df1f
    data
    captive02.stl
    24146041acc5b38f3ab1fddcead0c085
    data
    phillips01.stl
    b30dde7f357479fa009937aad27ea772
    data
    roundhead01.stl
    af2c81002fc385ff89cafeb285b53fad
    data
    ui.py
    6462b1d1f364ee3229c1ebaa1a9cfb28
    Python script, ASCII text executable, with CRLF line terminators
    utils.py
    fec70da46ca80d07069beecbe467deb0
    Python script, ASCII text executable, with CRLF line terminators
    Camera Pilot.url
    b4e42ad047990258318c4169fe902588
    Generic INItialization configuration [InternetShortcut]
    Courseslib.com Everything Free.txt
    3ab97015c8c3128af3fe06a0a537308e
    ASCII text, with no line terminators
    GFXfather.com.url
    0668a8c7d943ec5fefe875ba86040a06
    Generic INItialization configuration [InternetShortcut]
    Grafixfather.com.url
    aa161b50b38efd1318534f7b4c8c0e95
    Generic INItialization configuration [InternetShortcut]
    Join Our Secret Source.url
    b2e1f42e4ad6c0ffeef36ea6070bc421
    Generic INItialization configuration [InternetShortcut]
    Read Me!!!!!.txt
    9f79269d6277c09fc4e365dda5e156c6
    Unicode text, UTF-16, little-endian text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects possible shortcut usage for .URL persistence

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
fs2.grafixdrive.com/token/download/tempuser/10dt/Random_Flow_v3.0.1.zip?download_token=b6d65080acf3f52ce9c258db57d424aef768e2166e62e85c6d369e5a3f1f271d
65.21.93.86200 OK6.7 MB