Report Overview

  1. Submitted URL

    di.univ-blida.dz/xmlui/bitstream/handle/123456789/26895/2.621.381.149.pdf.exe?sequence=1&isAllowed=y

  2. IP

    41.111.243.104

    ASN

    #36947 Telecom Algeria

  3. Submitted

    2024-04-30 15:32:54

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
di.univ-blida.dzunknownunknown2022-10-042023-01-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumdi.univ-blida.dz/xmlui/bitstream/handle/123456789/26895/2.621.381.149.pdf.exe?sequence=1&isAllowed=yDetects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
mediumdi.univ-blida.dz/xmlui/bitstream/handle/123456789/26895/2.621.381.149.pdf.exe?sequence=1&isAllowed=yIdentifies compiled AutoIT script (as EXE).

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    di.univ-blida.dz/xmlui/bitstream/handle/123456789/26895/2.621.381.149.pdf.exe?sequence=1&isAllowed=y

  2. IP

    41.111.243.104

  3. ASN

    #36947 Telecom Algeria

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Size

    841 kB (841216 bytes)

  2. Hash

    f64f9f9da678a5eec683b559a1c45c5f

    2f8b3057b81dc7cc1724a50c30d503ce41f3fb09

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
di.univ-blida.dz/xmlui/bitstream/handle/123456789/26895/2.621.381.149.pdf.exe?sequence=1&isAllowed=y
41.111.243.104200 200841 kB