Report Overview

  1. Submitted URL

    kortatay.myz.info/remprocexp.exe

  2. IP

    94.53.120.109

    ASN

    #48161 Nextgen Communications Srl

  3. Submitted

    2024-04-16 09:32:16

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    Suspicious - DynDNS domain

Detections

  1. urlquery

    3

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
kortatay.myz.infounknown2001-10-262022-06-022023-07-25
aus5.mozilla.org25481998-01-242015-10-272024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumkortatay.myz.info/remprocexp.exeDetects win.xorist.

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    kortatay.myz.info/remprocexp.exe

  2. IP

    94.53.120.109

  3. ASN

    #48161 Nextgen Communications Srl

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections

    Size

    1.2 MB (1160035 bytes)

  2. Hash

    890bc2e1d113abde08614ebb49e79183

    113e138997ee4cc61c97b1e545a0a7727e687010

    Detections

    AnalyzerVerdictAlert
    Malpedia's yara-signator rulesmalware
    Detects win.xorist.
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (3)

URLIPResponseSize
kortatay.myz.info/
94.53.120.109 16 B
kortatay.myz.info/remprocexp.exe
94.53.120.109 1.2 MB
aus5.mozilla.org/update/3/GMP/111.0a1/20240129201730/Linux_x86_64-gcc3/null/default/Linux%205.15.0-101-generic%20(GTK%203.24.37%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201 444 B