Report Overview

  1. Submitted URL

    malsample.php.xdomain.jp/test_files/cs_maltest.exe

  2. IP

    157.112.147.23

    ASN

    #131965 Xserver Inc.

  3. Submitted

    2024-04-19 05:16:26

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
malsample.php.xdomain.jpunknown2012-03-162023-04-192024-03-04

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediummalsample.php.xdomain.jp/test_files/cs_maltest.exeDetects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
mediummalsample.php.xdomain.jp/test_files/cs_maltest.exeHunting_Rule_ShikataGaNai

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    malsample.php.xdomain.jp/test_files/cs_maltest.exe

  2. IP

    157.112.147.23

  3. ASN

    #131965 Xserver Inc.

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections

    Size

    139 kB (139338 bytes)

  2. Hash

    ab13d611d84b1a1d9ffbd21ac130a858

    336a334cd6f1263d3d36985a6a7dd15a4cf64cd9

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
    Public Nextron YARA rulesmalware
    Hunting_Rule_ShikataGaNai
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
malsample.php.xdomain.jp/test_files/cs_maltest.exe
157.112.147.23200 OK139 kB