Report Overview

  1. Visited public
    2025-02-19 20:14:25
    Tags
  2. URL

    jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    194.87.216.96

    #215540 Global Connectivity Solutions Llp

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
1
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
jolly-payne.194-87-216-96.plesk.pageunknown2020-03-182022-11-072022-11-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
low 194.87.216.96Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumjolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnkIdentifies PowerShell artefacts in shortcut (LNK) files.
mediumjolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnkIdentifies executable artefacts in shortcut (LNK) files.
mediumjolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnkIdentifies download artefacts in shortcut (LNK) files.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Windows Shortcut detected

  1. URL

    jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk

    IP / ASN
    194.87.216.96

    #215540 Global Connectivity Solutions Llp

  1. File type

    MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=11, Unicoded, HasExpIcon "%ProgramFiles%\Microsoft\Edge\Application\msedge.exe", length=0, window=showminnoactive, IDListSize 0x018b, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\"

  2. Hash

    MD5 8c635ae5575d6802b1805432a8115889
    SHA1 2f91a647553f61e0bb750d92f84c0c8ca72d3109
    SHA256 bc4ea240e69a1be4352e753cd9e35adb9ac3cc9d92bdb007d4b11351d50695fe
  1. Timestamps

    Created 2185-07-21 23:34:33
    Access 2185-07-21 23:34:33
    Write 2185-07-21 23:34:33
  2. Command-line data

    Working Directory

    Relative Path

    ..\..\..\Windows\System32\OpenSSH\ssh.exe

    Command Line Arguments
Detections
    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies PowerShell artefacts in shortcut (LNK) files.
    Public InfoSec YARA rulesmalware
    Identifies executable artefacts in shortcut (LNK) files.
    Public InfoSec YARA rulesmalware
    Identifies download artefacts in shortcut (LNK) files.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
jolly-payne.194-87-216-96.plesk.page/Documents/impact.pdf.lnk
194.87.216.96200 OK2.4 kB