Report Overview
- Visited public2025-04-15 20:27:37Tags
- URL
valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk
- Finishing URL
about:privatebrowsing
- IP / ASN
104.16.231.132
#13335 CLOUDFLARENET
Titleabout:privatebrowsing
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
valuable-munich-private-institution.trycloudflare.com | unknown | 2018-07-07 | 2025-04-15 | 2025-04-15 | 560 B | 3.2 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Timestamp | Severity | Source IP | Destination IP | Alert |
---|---|---|---|---|
2025-04-15 20:27:15 | low | Client IP | ![]() | |
2025-04-15 20:27:15 | low | Client IP | ![]() |
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2025-04-15 | medium | valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk | Identifies scripting artefacts in shortcut (LNK) files. |
2025-04-15 | medium | valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk | Identifies executable artefacts in shortcut (LNK) files. |
2025-04-15 | medium | valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk | Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path. |
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Windows Shortcut detected
- URL
valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk
IP / ASN104.16.230.132
#13335 CLOUDFLARENET
File type
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=11, Unicoded, HasExpIcon "%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe", EnableTargetMetadata, Archive, ctime=Sat Sep 15 07:12:47 2018, atime=Sat Sep 15 07:12:47 2018, mtime=Sat Sep 15 07:12:47 2018, length=14848, window=showminnoactive, IDListSize 0x013b, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Windows\System32\mshta.exe"
Hash
MD5 60d2c56f6442da684ca824c51a93eddeSHA1 d1fb256e92f812773b6a018637df56e3c63891eeSHA256 91cdf10ed292a169e32c5df33913845eda527e9940133e894a2e0840c2499a07
Timestamps
Created 2018-09-15 07:12:47Access 2018-09-15 07:12:47Write 2018-09-15 07:12:47Command-line data
Working DirectoryRelative Path..\..\..\..\Windows\System32\mshta.exe
Command Line Arguments
Analyzer | Verdict | Alert |
---|---|---|
Public InfoSec YARA rules | malware | Identifies scripting artefacts in shortcut (LNK) files. |
Public InfoSec YARA rules | malware | Identifies executable artefacts in shortcut (LNK) files. |
Public InfoSec YARA rules | malware | Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path. |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
valuable-munich-private-institution.trycloudflare.com/1FSVABRA/RE_007394029384393483.pdf.lnk | ![]() | 200 OK | 2.9 kB | |||||||||||||
Detections
HTTP Headers
| ||||||||||||||||