Report Overview
Visitedpublic
2025-02-14 05:31:20
Tags
Submit Tags
URL
files.extract.lol/u/opQYFg.zip
Finishing URL
about:privatebrowsing
IP / ASN
157.131.83.98
#46375 AS-SONICTELECOM
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
files.extract.lol
unknown2024-11-122025-02-142025-02-14

Related reports

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
files.extract.lol/u/opQYFg.zip
IP / ASN
157.131.83.98
#46375 AS-SONICTELECOM
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=store
Size5.4 MB (5399459 bytes)
MD569d7cc6eed94e6c90578944c97f1a895
SHA16dddbd67793be7d1bfe61f6c8b4659373716833d
Archive (2)
FilenameMD5File type
Limitless Tweaks.exebb49a3f432280cf48519868e607d4edePE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
ReaLTaiizor.dll49404b71b0c7c91d56967747fa5052dcPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

Detections

AnalyzerVerdictAlert
YARAhub by abuse.chmalware
Detect pe file that no import table
VirusTotalmalicious
ClamAVmalicious
Win.Packed.Bulz-10008187-0

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize