Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
gomoll.com | unknown | 2000-01-25 | 2019-06-10 | 2024-02-22 | 474 B | 16 MB | 91.238.164.173 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
gomoll.com/cache.zip
IP
91.238.164.173
ASN
#52148 Enix Ltd
File type
Zip archive data, at least v2.0 to extract, compression method=store
Size
16 MB (16458970 bytes)
Hash
5a66fb08002549d5ed7f5da0ba58e9a2
cfd961a25704c4b4b1ec163694a3b9a654f0ada3
Archive (15)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
cd32e2e8-25b5-4442-97ae-3bd35d0253cd.php | e9bc957339855df2bd85573c62d3402c
| PHP script, ASCII text, with very long lines (54048) | ||||||
992b0a8a-e3aa-46cc-b4a4-5af8fbe4c21d.php | a36e2e65dc2c6ec32dc48153f71855d3 | PHP script, ASCII text, with CRLF line terminators | ||||||
36089792-4128-4331-8457-4d1f6d6938b0.php | 6941cd5f04f52559f129276a11b479fe
| PHP script, ASCII text, with very long lines (39445) | ||||||
5928ffbc-9757-4842-8d35-514c2f26ee0d.php | 63bbd02c13b575ea5f33d66c766b4d69 | PHP script, ASCII text | ||||||
bbdf172a-fe42-4a10-ba69-8db660cf1b0a.php | a4e73ffb54654b9129bc485650312179 | PHP script, Non-ISO extended-ASCII text, with very long lines (31112), with NEL line terminators | ||||||
d09659ab-0892-498f-a65d-7119cc6241d6.php | 974e03e33e08c9ca6d454e158c617b90 | PHP script, ASCII text, with CRLF line terminators | ||||||
cbd85014-e046-40ac-8f8c-22d6085d4079.php | faaf359baf74ca3f3584cd0bc2790841 | PHP script, ASCII text, with very long lines (12314), with CRLF line terminators | ||||||
e7f8c929-07f5-4e85-a05c-dfa67866aa72.php | 37fa8dd4f62e554a6717e97cfecffefb | PHP script, ASCII text | ||||||
g.php | 3e6aba070e9c773a0ca022daccccf4c9 | PHP script, ASCII text | ||||||
g.zip | 19934fc6dc753b81c6717025da75a617 | Zip archive data, at least v2.0 to extract, compression method=deflate | ||||||
b.zip | 930eefe42a6a1ff75ff864cc13847419 | Zip archive data, at least v2.0 to extract, compression method=store | ||||||
y.zip | 3d5804ce187bee7af5e060437acab337 | Zip archive data, at least v2.0 to extract, compression method=store | ||||||
d.zip | dee8ac749fd413ce2c107fa886b98581 | Zip archive data, at least v2.0 to extract, compression method=store | ||||||
c.zip | 01b39c96e041d96f9f623f92cd52da74 | Zip archive data, at least v2.0 to extract, compression method=store | ||||||
a.zip | 6919d668078dcbd74e041a9e0a198fb5 | Zip archive data, at least v2.0 to extract, compression method=store |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | php webshell containing base64 encoded payload |
Public Nextron YARA rules | malware | PHP webshell which directly eval()s obfuscated string |
Public Nextron YARA rules | malware | PHP webshell using some kind of eval with encoded blob to decode |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |
---|---|---|---|---|
gomoll.com/cache.zip | 91.238.164.173 | 200 OK | 16 MB | |
HTTP Headers
| ||||