Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
memtest.org | unknown | 2003-12-21 | 2012-07-08 | 2024-12-22 | 507 B | 355 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
memtest.org/download/v7.20/mt86plus_7.20.binaries.zip
IP
212.129.20.209
ASN
#12876 Scaleway S.a.s.
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
354 kB (354419 bytes)
Hash
9093f3d499da15253b862c74769a974a
bb770c26f54ccd6ae644d4c647b452e71d40ef47
Archive (5)
Filename | Md5 | File type | |||
---|---|---|---|---|---|
memtest32.bin | ece4cd120ace6b209fc5cdbcc0d5dfc7 | Linux kernel x86 boot executable bzImage, version Memtest86+ v7.20, RW-rootFS, | |||
memtest32.efi | 56ef6b02771538914ebff983840a1485
| Linux kernel x86 boot executable bzImage, version Memtest86+ v7.20, RW-rootFS, | |||
memtest64.bin | 41949af8fed9c640f400dda35f42d9d1 | Linux kernel x86 boot executable bzImage, version Memtest86+ v7.20, RW-rootFS, | |||
memtest64.efi | 92b7a4f04fc9940af221b26cf077736b
| Linux kernel x86 boot executable bzImage, version Memtest86+ v7.20, RW-rootFS, | |||
memtestla64.efi | 6ee951ed41bb2a54482111a26a0d93a1
| PE32+ executable (EFI application) LoongArch 64-bit (stripped to external PDB), for MS Windows, 3 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
memtest.org/download/v7.20/mt86plus_7.20.binaries.zip | ![]() | 200 OK | 354 kB | |||||||
Detections
HTTP Headers
| ||||||||||