Report Overview
Visitedpublic
2025-04-26 08:16:19
Tags
Submit Tags
URL
37.143.15.110:8888/LaZagne.exe
Finishing URL
about:privatebrowsing
IP / ASN
37.143.15.110
#210079 EuroByte LLC
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
3
Threat Detection Systems
9

Host Summary

HostRankRegisteredFirst SeenLast Seen
37.143.15.110
unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
mediumClient IP
37.143.15.110
ET INFO Executable Download from dotted-quad Host
high
37.143.15.110
Client IPET POLICY PE EXE or DLL Windows file download HTTP
medium
37.143.15.110
Client IPET HUNTING SUSPICIOUS Dotted Quad Host MZ Response

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium37.143.15.110:8888/LaZagne.exeDetects Lazagne password extractor hacktool
medium37.143.15.110:8888/LaZagne.exeIdentifies LaZagne, credentials recovery project.
medium37.143.15.110:8888/LaZagne.exeIdentifies executable converted using PyInstaller.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium37.143.15.110Sinkholed

ThreatFox

No alerts detected


File detected

URL
37.143.15.110:8888/LaZagne.exe
IP / ASN
37.143.15.110
#210079 EuroByte LLC
File Overview
File TypePE32+ executable (console) x86-64, for MS Windows, 6 sections
Size10 MB (10136093 bytes)
MD581448745b5d62608b37888b38e9f276a
SHA13197ad76e27ca63e6de1b255f7c0196ea7670bf8

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Detects Lazagne password extractor hacktool
Public InfoSec YARA rulesmalware
Identifies LaZagne, credentials recovery project.
Public InfoSec YARA rulesmalware
Identifies executable converted using PyInstaller.
VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET 37.143.15.110:8888/LaZagne.exe
37.143.15.110200 OK10 MB