Report Overview

  1. Visited public
    2025-04-15 20:27:37
    Tags
  2. URL

    valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    104.16.231.132

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
2
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
valuable-munich-private-institution.trycloudflare.comunknown2018-07-072025-04-152025-04-15

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP 104.16.230.132
lowClient IP 104.16.230.132

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumvaluable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnkIdentifies scripting artefacts in shortcut (LNK) files.
mediumvaluable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnkIdentifies executable artefacts in shortcut (LNK) files.
mediumvaluable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnkIdentifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Windows Shortcut detected

  1. URL

    valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk

    IP / ASN
    104.16.230.132

    #13335 CLOUDFLARENET

  1. File type

    MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=11, Unicoded, HasExpIcon "%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe", EnableTargetMetadata, Archive, ctime=Sat Sep 15 07:12:47 2018, atime=Sat Sep 15 07:12:47 2018, mtime=Sat Sep 15 07:12:47 2018, length=14848, window=showminnoactive, IDListSize 0x013b, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Windows\System32\mshta.exe"

  2. Hash

    MD5 60d2c56f6442da684ca824c51a93edde
    SHA1 d1fb256e92f812773b6a018637df56e3c63891ee
    SHA256 91cdf10ed292a169e32c5df33913845eda527e9940133e894a2e0840c2499a07
  1. Timestamps

    Created 2018-09-15 07:12:47
    Access 2018-09-15 07:12:47
    Write 2018-09-15 07:12:47
  2. Command-line data

    Working Directory

    Relative Path

    ..\..\..\..\Windows\System32\mshta.exe

    Command Line Arguments
Detections
    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies scripting artefacts in shortcut (LNK) files.
    Public InfoSec YARA rulesmalware
    Identifies executable artefacts in shortcut (LNK) files.
    Public InfoSec YARA rulesmalware
    Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk
104.16.230.132200 OK2.9 kB