Report Overview

  1. Submitted URL

    gomoll.com/cache.zip

  2. IP

    91.238.164.173

    ASN

    #52148 Enix Ltd

  3. Submitted

    2024-04-16 09:05:12

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
gomoll.comunknown2000-01-252019-06-102024-02-22

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    gomoll.com/cache.zip

  2. IP

    91.238.164.173

  3. ASN

    #52148 Enix Ltd

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    16 MB (16458970 bytes)

  2. Hash

    5a66fb08002549d5ed7f5da0ba58e9a2

    cfd961a25704c4b4b1ec163694a3b9a654f0ada3

  1. Archive (15)

  2. FilenameMd5File type
    cd32e2e8-25b5-4442-97ae-3bd35d0253cd.php
    e9bc957339855df2bd85573c62d3402c
    PHP script, ASCII text, with very long lines (54048)
    992b0a8a-e3aa-46cc-b4a4-5af8fbe4c21d.php
    a36e2e65dc2c6ec32dc48153f71855d3
    PHP script, ASCII text, with CRLF line terminators
    36089792-4128-4331-8457-4d1f6d6938b0.php
    6941cd5f04f52559f129276a11b479fe
    PHP script, ASCII text, with very long lines (39445)
    5928ffbc-9757-4842-8d35-514c2f26ee0d.php
    63bbd02c13b575ea5f33d66c766b4d69
    PHP script, ASCII text
    bbdf172a-fe42-4a10-ba69-8db660cf1b0a.php
    a4e73ffb54654b9129bc485650312179
    PHP script, Non-ISO extended-ASCII text, with very long lines (31112), with NEL line terminators
    d09659ab-0892-498f-a65d-7119cc6241d6.php
    974e03e33e08c9ca6d454e158c617b90
    PHP script, ASCII text, with CRLF line terminators
    cbd85014-e046-40ac-8f8c-22d6085d4079.php
    faaf359baf74ca3f3584cd0bc2790841
    PHP script, ASCII text, with very long lines (12314), with CRLF line terminators
    e7f8c929-07f5-4e85-a05c-dfa67866aa72.php
    37fa8dd4f62e554a6717e97cfecffefb
    PHP script, ASCII text
    g.php
    3e6aba070e9c773a0ca022daccccf4c9
    PHP script, ASCII text
    g.zip
    19934fc6dc753b81c6717025da75a617
    Zip archive data, at least v2.0 to extract, compression method=deflate
    b.zip
    930eefe42a6a1ff75ff864cc13847419
    Zip archive data, at least v2.0 to extract, compression method=store
    y.zip
    3d5804ce187bee7af5e060437acab337
    Zip archive data, at least v2.0 to extract, compression method=store
    d.zip
    dee8ac749fd413ce2c107fa886b98581
    Zip archive data, at least v2.0 to extract, compression method=store
    c.zip
    01b39c96e041d96f9f623f92cd52da74
    Zip archive data, at least v2.0 to extract, compression method=store
    a.zip
    6919d668078dcbd74e041a9e0a198fb5
    Zip archive data, at least v2.0 to extract, compression method=store

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    php webshell containing base64 encoded payload
    Public Nextron YARA rulesmalware
    PHP webshell which directly eval()s obfuscated string
    Public Nextron YARA rulesmalware
    PHP webshell using some kind of eval with encoded blob to decode

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
gomoll.com/cache.zip
91.238.164.173200 OK16 MB