Report Overview

  1. Visited public
    2025-05-09 06:16:28
    Tags
  2. URL

    t1.handprintscariness.ru/1.lnk

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    104.21.87.203

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
t1.handprintscariness.ruunknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumt1.handprintscariness.ru/1.lnkIdentifies PowerShell artefacts in shortcut (LNK) files.
mediumt1.handprintscariness.ru/1.lnkIdentifies executable artefacts in shortcut (LNK) files.
mediumt1.handprintscariness.ru/1.lnkIdentifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Windows Shortcut detected

  1. URL

    t1.handprintscariness.ru/1.lnk

    IP / ASN
    172.67.145.242

    #13335 CLOUDFLARENET

  1. File type

    MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=0, Unicoded KnownFolderID 1AC14E77-02E7-4E5D-B744-2EB1AE5198B7, length=0, window=showminnoactive, IDListSize 0x020d, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\"

  2. Hash

    MD5 2902a07bc9ea1f31fc205e4206703543
    SHA1 643e923a31866776acc4c36c7a79afb27315930c
    SHA256 9834bac2717ea3cdfe8f92f8577af0e2ae0be9f34554a7cfb6de70add1eb1421
  1. Timestamps

    Created 2185-07-21 23:34:33
    Access 2185-07-21 23:34:33
    Write 2185-07-21 23:34:33
  2. Command-line data

    Working Directory

    Relative Path

    ..\..\..\..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

    Command Line Arguments
Detections
    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies PowerShell artefacts in shortcut (LNK) files.
    Public InfoSec YARA rulesmalware
    Identifies executable artefacts in shortcut (LNK) files.
    Public InfoSec YARA rulesmalware
    Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
t1.handprintscariness.ru/1.lnk
172.67.145.242200 OK1.7 kB