Report Overview

  1. Submitted URL

    www.sordum.org/files/easy-context-menu/ec_menu.zip

  2. IP

    185.146.22.240

    ASN

    #55293 A2HOSTING

  3. Submitted

    2024-04-17 06:07:14

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.sordum.orgunknown2013-01-302013-02-022024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.sordum.org/files/easy-context-menu/ec_menu.zip

  2. IP

    185.146.22.240

  3. ASN

    #55293 A2HOSTING

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    1.7 MB (1669726 bytes)

  2. Hash

    677929514bbbafce965ac3e8c1e376ea

    bf6004698e33611389eb8b420bc4c2ad59736b58

  1. Archive (13)

  2. FilenameMd5File type
    EcMenu.exe
    fdea0366e834590a45a95bd697b4b1a3
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    EcMenu_x64.exe
    d4cae9981946b6e2fb1cf52eedd10261
    PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
    EcMenu.ini
    a03ecec0a5ddf825d8e95882f71028d2
    Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Items.ini
    788c708762fca4c7ce003dc8022a660c
    Unicode text, UTF-16, little-endian text, with CRLF line terminators
    NirCmd.chm
    66729efe2819e71c060af7fd49732c28
    MS Windows HtmlHelp Data
    nircmd_x64.exe
    80cce4afc880cde9f75dc4e8b497da80
    PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
    nircmd_x86.exe
    ba2cf7d2d09ae9a29445704bd1b4f67b
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    Readme.txt
    d1526bf12db4b795b35535aad8136572
    ASCII text, with CRLF line terminators
    SnippingTool.ico
    dbcf83361a0c5f09fa8b3014bbaae632
    MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
    SnippingTool.vbs
    198e2203276744b37ed3327009580034
    ASCII text, with CRLF line terminators
    StickyNotes.ico
    0b1299c03d6105c6cea70e1ea9856825
    MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
    StickyNotes.vbs
    6036af57c7a434a72c39d0e35be4c02c
    ASCII text, with CRLF line terminators
    Read_me.html
    833fe298f0a553a12e9bbb609937635f
    HTML document, Non-ISO extended-ASCII text, with very long lines (381), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.sordum.org/files/easy-context-menu/ec_menu.zip
185.146.22.240200 OK1.7 MB