Report Overview

  1. Submitted URL

    www.greatis.com/dbs.zip

  2. IP

    144.217.89.149

    ASN

    #16276 OVH SAS

  3. Submitted

    2024-04-18 02:05:56

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.greatis.comunknown2000-02-172012-05-242024-04-14

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.greatis.com/dbs.zip

  2. IP

    144.217.89.149

  3. ASN

    #16276 OVH SAS

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    2.5 MB (2484730 bytes)

  2. Hash

    3155d432abd27b6f3f4da6da470a9526

    19f228c9f55b29ae993faa11f7b2229756cdec3e

  1. Archive (2)

  2. FilenameMd5File type
    dbs.db
    df6f617b111263c550de2e7885ecc6b9
    SQLite 3.x database, last written using SQLite version 3019003, page size 1024, file counter 21949, database pages 5332, cookie 0x49, schema 4, UTF-8, version-valid-for 21920
    dbswww.ini
    a51d66ad251775de63d8b8d86c3323d1
    Generic INItialization configuration [Chat]

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious PowerShell code that downloads from web sites
    Public InfoSec YARA rulesmalware
    Identifies AutoIT script.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.greatis.com/dbs.zip
144.217.89.149 2.5 MB