Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1223915036813037668/1228275037631676489/GDRVLoader.exe?ex=662b7345&is=6618fe45&hm=23d44b6c3d9ddcd11e0925602a3924528891737fa4e31d980194c8318d4e6f1d&

  2. IP

    162.159.134.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-16 06:48:47

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumcdn.discordapp.com/attachments/1223915036813037668/1228275037631676489/GDRVLoader.exe?ex=662b7345&is=6618fe45&hm=23d44b6c3d9ddcd11e0925602a3924528891737fa4e31d980194c8318d4e6f1d&Detects a vulnerable GIGABYTE driver sometimes used by malicious actors to escalate privileges
mediumcdn.discordapp.com/attachments/1223915036813037668/1228275037631676489/GDRVLoader.exe?ex=662b7345&is=6618fe45&hm=23d44b6c3d9ddcd11e0925602a3924528891737fa4e31d980194c8318d4e6f1d&Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - gdrv.sys

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1223915036813037668/1228275037631676489/GDRVLoader.exe?ex=662b7345&is=6618fe45&hm=23d44b6c3d9ddcd11e0925602a3924528891737fa4e31d980194c8318d4e6f1d&

  2. IP

    162.159.133.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32+ executable (console) x86-64, for MS Windows, 6 sections

    Size

    47 kB (46592 bytes)

  2. Hash

    533ddcc710cc885a9716efda7d6c34e6

    9640682718d39249ac3af1d66726bb66d0efc110

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects a vulnerable GIGABYTE driver sometimes used by malicious actors to escalate privileges
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - gdrv.sys
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1223915036813037668/1228275037631676489/GDRVLoader.exe?ex=662b7345&is=6618fe45&hm=23d44b6c3d9ddcd11e0925602a3924528891737fa4e31d980194c8318d4e6f1d&
162.159.133.233200 OK47 kB