Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1138232186072481833/1224725154630864976/dControl.zip?ex=661e892f&is=660c142f&hm=5c7e75940712a3545da872112d66de28cfb073d2f6493462ca864fe0c2148680&

  2. IP

    162.159.129.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-16 13:01:02

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1138232186072481833/1224725154630864976/dControl.zip?ex=661e892f&is=660c142f&hm=5c7e75940712a3545da872112d66de28cfb073d2f6493462ca864fe0c2148680&

  2. IP

    162.159.134.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    459 kB (458940 bytes)

  2. Hash

    d510a0998d07bf8f18db5c2aeff6505a

    42e1b7d2fef674c48bfe8b872576bbb842c38bed

  1. Archive (4)

  2. FilenameMd5File type
    dControl.zip
    838ea4685ae2f89cdd3fc948e37bd138
    Zip archive data, at least v2.0 to extract, compression method=store
    Defender_Settings.vbs
    b0bf0a477bcca312021177572311e666
    ASCII text, with CRLF line terminators
    ReadMe.txt
    8dbe87a9bf6342c4e2ea406fa86e76bb
    Non-ISO extended-ASCII text, with CRLF line terminators
    _Password.txt
    298453d3172225457a580da98b543235
    ASCII text, with very long lines (302), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies Defender Control, used by attackers to disable Windows Defender.
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1138232186072481833/1224725154630864976/dControl.zip?ex=661e892f&is=660c142f&hm=5c7e75940712a3545da872112d66de28cfb073d2f6493462ca864fe0c2148680&
162.159.134.233200 OK459 kB