Report Overview

  1. Visited public
    2024-12-14 20:08:20
    Tags
  2. URL

    154.213.187.20/bot.m68k

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    154.213.187.20

    #51396 Pfcloud UG

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
4
Threat Detection Systems
13

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
154.213.187.20unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
medium 154.213.187.20Client IP
medium 154.213.187.20Client IP
mediumClient IP 154.213.187.20
high 154.213.187.20Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium154.213.187.20/bot.m68kDetects multiple Mirai variants
medium154.213.187.20/bot.m68kDetects Gafgyt
medium154.213.187.20/bot.m68kYakuza botnet
medium154.213.187.20/bot.m68kLinux.Trojan.Gafgyt
medium154.213.187.20/bot.m68kLinux.Trojan.Gafgyt

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium154.213.187.20Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    154.213.187.20/bot.m68k

  2. IP

    154.213.187.20

  3. ASN

    #35916 MULTA-ASN1

  1. File type

    ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV)

    Size

    156 kB (155808 bytes)

  2. Hash

    b8c3796b9172f6b196ca9af767d1a151

    5272036c03fa66adea7dc133a70958337c47c065

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detects multiple Mirai variants
    YARAhub by abuse.chmalware
    Detects Gafgyt
    YARAhub by abuse.chmalware
    Yakuza botnet
    Elastic Security YARA Rulesmalware
    Linux.Trojan.Gafgyt
    Elastic Security YARA Rulesmalware
    Linux.Trojan.Gafgyt
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
154.213.187.20/bot.m68k
154.213.187.20200 OK156 kB