Report Overview

  1. Submitted URL

    195.20.16.153/WinRing0x64.sys

  2. IP

    195.20.16.153

    ASN

    #211409 Shelter LLC

  3. Submitted

    2024-04-20 13:18:21

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    3

  3. Threat Detection Systems

    7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
195.20.16.153unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
highClient IP 195.20.16.153
high 195.20.16.153Client IP
medium 195.20.16.153Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium195.20.16.153/WinRing0x64.sysDetects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - WinRing0x64.sys
medium195.20.16.153/WinRing0x64.syssigned_sys_with_vulnerablity

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium195.20.16.153Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    195.20.16.153/WinRing0x64.sys

  2. IP

    195.20.16.153

  3. ASN

    #211409 Shelter LLC

  1. File type

    PE32+ executable (native) x86-64, for MS Windows, 6 sections

    Size

    14 kB (14544 bytes)

  2. Hash

    0c0195c48b6b8582fa6f6373032118da

    d25340ae8e92a6d29f599fef426a2bc1b5217299

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - WinRing0x64.sys
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
195.20.16.153/WinRing0x64.sys
195.20.16.153200 OK14 kB