Report Overview

  1. Submitted URL

    sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.com/store/39857/listings/deliverables/NBc3jlQPj9L0Ac8sY8w166xsg70xpVkiN7KoXEyy.zip?response-content-disposition=attachment;%20filename%20="NBc3jlQPj9L0Ac8sY8w166xsg70xpVkiN7KoXEyy.zip"&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=968c8ef1669cf97adff907d50b2038b0/20240426/auto/s3/aws4_request&X-Amz-Date=20240426T010527Z&X-Amz-SignedHeaders=host&X-Amz-Expires=3600&X-Amz-Signature=2d2d28df9c83bba19319aedd32d083010eb3d29707c9ec59d28af3b90e87dd70

  2. IP

    104.18.9.90

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-26 01:07:26

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.comunknown2018-07-312023-01-032024-04-17

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.com/store/39857/listings/deliverables/NBc3jlQPj9L0Ac8sY8w166xsg70xpVkiN7KoXEyy.zip?response-content-disposition=attachment;%20filename%20=%22NBc3jlQPj9L0Ac8sY8w166xsg70xpVkiN7KoXEyy.zip%22&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=968c8ef1669cf97adff907d50b2038b0/20240426/auto/s3/aws4_request&X-Amz-Date=20240426T010527Z&X-Amz-SignedHeaders=host&X-Amz-Expires=3600&X-Amz-Signature=2d2d28df9c83bba19319aedd32d083010eb3d29707c9ec59d28af3b90e87dd70

  2. IP

    104.18.8.90

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    500 kB (499606 bytes)

  2. Hash

    0c91defddf14a2af8ac5fd712ecf7e73

    6be799a085e4bdd6dc8f0653e64b7e8494352ec2

  1. Archive (5)

  2. FilenameMd5File type
    dControl.ini
    05450ff06366ae22654b63a6e27d1624
    Unicode text, UTF-16, little-endian text, with CRLF line terminators
    defcon.exe
    58008524a6473bdf86c1040a9a9e39c3
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    Defender_Settings.vbs
    b0bf0a477bcca312021177572311e666
    ASCII text, with CRLF line terminators
    READ ME .txt
    3b5689bfc1509b2c0a1d3ae1e3decd6d
    ASCII text, with CRLF line terminators
    VantaLoader-updated.exe
    af65100b3f8c0dfa17462c49ca06f1fe
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects malware by known bad imphash or rich_pe_header_hash
    Public InfoSec YARA rulesmalware
    Identifies Defender Control, used by attackers to disable Windows Defender.
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.com/store/39857/listings/deliverables/NBc3jlQPj9L0Ac8sY8w166xsg70xpVkiN7KoXEyy.zip?response-content-disposition=attachment;%20filename%20=%22NBc3jlQPj9L0Ac8sY8w166xsg70xpVkiN7KoXEyy.zip%22&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=968c8ef1669cf97adff907d50b2038b0/20240426/auto/s3/aws4_request&X-Amz-Date=20240426T010527Z&X-Amz-SignedHeaders=host&X-Amz-Expires=3600&X-Amz-Signature=2d2d28df9c83bba19319aedd32d083010eb3d29707c9ec59d28af3b90e87dd70
104.18.8.90 500 kB