Report Overview
Visitedpublic
2025-04-26 08:16:19
Tags
Submit Tags
URL
37.143.15.110:8888/LaZagne.exe
Finishing URL
about:privatebrowsing
IP / ASN

37.143.15.110
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
3
Threat Detection Systems
9
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
37.143.15.110 5 alert(s) on this Domain | unknown | unknown | No data | No data | 414 B | 10 MB | ![]() 37.143.15.110 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Timestamp | Severity | Source IP | Destination IP | Alert |
---|---|---|---|---|
medium | Client IP | ![]() 37.143.15.110 | ET INFO Executable Download from dotted-quad Host | |
high | ![]() 37.143.15.110 | Client IP | ET POLICY PE EXE or DLL Windows file download HTTP | |
medium | ![]() 37.143.15.110 | Client IP | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2025-04-26 | medium | 37.143.15.110:8888/LaZagne.exe | Detects Lazagne password extractor hacktool |
2025-04-26 | medium | 37.143.15.110:8888/LaZagne.exe | Identifies LaZagne, credentials recovery project. |
2025-04-26 | medium | 37.143.15.110:8888/LaZagne.exe | Identifies executable converted using PyInstaller. |
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2025-04-26 | medium | 37.143.15.110 | Sinkholed |
ThreatFox
No alerts detected
File detected
URL
37.143.15.110:8888/LaZagne.exe
IP / ASN

37.143.15.110
File Overview
File TypePE32+ executable (console) x86-64, for MS Windows, 6 sections
Size10 MB (10136093 bytes)
MD581448745b5d62608b37888b38e9f276a
SHA13197ad76e27ca63e6de1b255f7c0196ea7670bf8
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects Lazagne password extractor hacktool |
Public InfoSec YARA rules | malware | Identifies LaZagne, credentials recovery project. |
Public InfoSec YARA rules | malware | Identifies executable converted using PyInstaller. |
VirusTotal | malicious |
JavaScript (0)
No Javascripts found
No JavaScripts
HTTP Transactions (1)
URL | IP | Response | Size | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET 37.143.15.110:8888/LaZagne.exe | ![]() | 200 OK | 10 MB | |||||||||||||||||||
URL 37.143.15.110:8888/LaZagne.exe IP / ASN ![]() 37.143.15.110 Requested byN/A Resource Info File typePE32+ executable (console) x86-64, for MS Windows, 6 sections First Seen2025-04-15 Last Seen2025-05-17 Times Seen6 Size10 MB (10136093 bytes) MD581448745b5d62608b37888b38e9f276a SHA13197ad76e27ca63e6de1b255f7c0196ea7670bf8 SHA256dc06d62ee95062e714f2566c95b8edaabfd387023b1bf98a09078b84007d5268 Detections
HTTP Headers
| ||||||||||||||||||||||