Report Overview

  1. Submitted URL

    www.etman2.com.ar/NC/Act.zip

  2. IP

    179.43.120.177

    ASN

    #27823 Dattatec.com

  3. Submitted

    2024-04-24 04:03:47

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.etman2.com.arunknown2009-08-052015-03-212024-03-11

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.etman2.com.ar/NC/Act.zip

  2. IP

    179.43.120.177

  3. ASN

    #27823 Dattatec.com

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    3.1 MB (3106679 bytes)

  2. Hash

    6fcee5fa16e8deba78d9f44d182486f2

    677440629b6ff1dc8c0016a29854fdbe7e42f797

  1. Archive (21)

  2. FilenameMd5File type
    Ionic.Zip.dll
    f6933bf7cee0fd6c80cdf207ff15a523
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Pedidos.exe
    2d7d6198e74019044904321ca92367c6
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    System.Data.SQLite.dll
    c24d8a3af83c9aa4844b40e89e55fed9
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    SQLite.Interop.dll
    d5d111ab9e9e02f31a7261fb3c9f4a9c
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections
    SQLite.Interop.dll
    87becf5782ae6a051e122dcfa8c019b5
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    banner.gif
    63cdb69c4b286df5b1e8468f3bfd6f5a
    GIF image data, version 89a, 702 x 102
    Catalogo.exe
    e9b4d3c90b2743299788096c9a0538cb
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Catalogo.exe.config
    a1310b1cb95ded2e2df8061e6ca65cf9
    XML 1.0 document, ASCII text, with CRLF line terminators
    CBClassCatalog.dll
    cbd6d2b3816f18b5668b87944afc5548
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    CBClassModule.dll
    7e68b77cbbae562b16aecb69a25356ca
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    CBPreload.exe
    c0b1d036f2a5b66ee1ad4b2118629653
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Ccpbar.exe
    826480195097393c9c06b3a30db512ab
    PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
    Etman.ini
    82870fa3a3875a9b72089d8846a367a7
    Generic INItialization configuration [LOG]
    EtmanP2.db
    ee4249cabfff2b7b78b09d7c744af65e
    SQLite 3.x database, last written using SQLite version 3008010, page size 1024, file counter 34, database pages 32, cookie 0x1e, schema 4, UTF-8, version-valid-for 34
    Icono.ico
    7ce3e773f3c9b811fd7cb7802166ae48
    MS Windows icon resource - 1 icon, 32x32, 8 colors
    sqlite3.exe
    d9fc2ef852b4aa2e1c5ddc4f180494cc
    PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
    sqlite3811.exe
    4a4ad34b149c86b7f873dec37f46562f
    PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections
    Listas.dat
    7541503c78e7dbe143f8633a6f809ea3
    HTML document, ASCII text, with CRLF line terminators
    Pedido.dat
    655c75b87e200f86026354fad32c108b
    HTML document, ASCII text, with CRLF line terminators
    Presupuesto.dat
    60bfd1142d4eaef691605503938a0017
    HTML document, ASCII text, with CRLF line terminators
    Version.txt
    15a904995e8d85170b33871911081410
    Unicode text, UTF-8 (with BOM) text, with no line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.etman2.com.ar/NC/Act.zip
179.43.120.177200 OK3.1 MB