Report Overview

  1. Submitted URL

    www.inveigle.net/downloads/CMail_0.8.10_amd64-NoSSL.zip

  2. IP

    209.141.42.125

    ASN

    #53667 PONYNET

  3. Submitted

    2024-03-29 07:15:55

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.inveigle.netunknown2002-06-302014-10-072024-03-11

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.inveigle.net/downloads/CMail_0.8.10_amd64-NoSSL.zip

  2. IP

    209.141.42.125

  3. ASN

    #53667 PONYNET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    109 kB (109368 bytes)

  2. Hash

    23e6a0588164030f74004861c4b19b92

    8de9f581c96977229a59a16eb056c8b3d9c688e4

  1. Archive (2)

  2. FilenameMd5File type
    cmail-nossl.exe
    d4a6863ef91f24e93180a6d74a179419
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 10 sections
    cmail.txt
    bf20c93f3f33793b79f1c1fea4008248
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious file path pointing to the root of a folder easily accessible via environment variables

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.inveigle.net/downloads/CMail_0.8.10_amd64-NoSSL.zip
209.141.42.125200 OK109 kB