Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
jolly-payne.194-87-216-96.plesk.page | unknown | 2020-03-18 | 2022-11-07 | 2022-11-07 | 443 B | 2.6 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Timestamp | Severity | Source IP | Destination IP | Alert |
---|---|---|---|---|
2025-02-19 20:14:05 | low | ![]() | Client IP |
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2025-02-19 | medium | jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk | Identifies PowerShell artefacts in shortcut (LNK) files. |
2025-02-19 | medium | jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk | Identifies executable artefacts in shortcut (LNK) files. |
2025-02-19 | medium | jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk | Identifies download artefacts in shortcut (LNK) files. |
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Windows Shortcut detected
- URL
jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk
IP / ASN194.87.216.96
#215540 Global Connectivity Solutions Llp
File type
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=11, Unicoded, HasExpIcon "%ProgramFiles%\Microsoft\Edge\Application\msedge.exe", length=0, window=showminnoactive, IDListSize 0x018b, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\"
Hash
MD5 8c635ae5575d6802b1805432a8115889SHA1 2f91a647553f61e0bb750d92f84c0c8ca72d3109SHA256 bc4ea240e69a1be4352e753cd9e35adb9ac3cc9d92bdb007d4b11351d50695fe
Timestamps
Created 2185-07-21 23:34:33Access 2185-07-21 23:34:33Write 2185-07-21 23:34:33Command-line data
Working DirectoryRelative Path..\..\..\Windows\System32\OpenSSH\ssh.exe
Command Line Arguments
Analyzer | Verdict | Alert |
---|---|---|
Public InfoSec YARA rules | malware | Identifies PowerShell artefacts in shortcut (LNK) files. |
Public InfoSec YARA rules | malware | Identifies executable artefacts in shortcut (LNK) files. |
Public InfoSec YARA rules | malware | Identifies download artefacts in shortcut (LNK) files. |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk | ![]() | 200 OK | 2.4 kB | |||||||||||||||||||
Detections
HTTP Headers
| ||||||||||||||||||||||