Report Overview
Visitedpublic
2024-12-21 17:00:57
Tags
Submit Tags
URL
files.ethermailer.com/macesroomc/files/BI19-AH009-WO-1.zip
Finishing URL
about:privatebrowsing
IP / ASN
104.21.23.146
#13335 CLOUDFLARENET
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Host Summary

HostRankRegisteredFirst SeenLast Seen
files.ethermailer.com
unknown2016-11-082017-04-062024-12-20

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
files.ethermailer.com/macesroomc/files/BI19-AH009-WO-1.zip
IP / ASN
172.67.211.168
#13335 CLOUDFLARENET
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size801 kB (801233 bytes)
MD5a6ae372e1209c3d4fc5ef7bcbcfaaeea
SHA1b5d0b9f5e0410d253cab3b0d69c1a3f03d9275aa
Archive (1)
FilenameMD5File type
BI19-AH009-WO-1.exeec3ba2f9b2d0b8236ac14326f17c2512PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

Detections

AnalyzerVerdictAlert
Public InfoSec YARA rulesmalware
Identifies compiled AutoIT script (as EXE).
VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
files.ethermailer.com/macesroomc/files/BI19-AH009-WO-1.zip
172.67.211.168200 OK801 kB