Report Overview

  1. Visited public
    2025-05-06 04:18:08
    Tags
  2. URL

    dl.packetstormsecurity.net/1011-exploits/uacpoc.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    198.84.60.200

    #54876 ROKABEAR

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
dl.packetstormsecurity.netunknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    dl.packetstormsecurity.net/1011-exploits/uacpoc.zip

  2. IP

    198.84.60.200

  3. ASN

    #54876 ROKABEAR

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    505 kB (505060 bytes)

  2. Hash

    c47d612c00713e5ff16a5e3db8da5ad9

    c91ada908da28f8823484791f6b9217f0630a09e

  1. Archive (9)

  2. FilenameMd5File type
    poc.exe
    e68d3ba695d7a99e61f9b8c2a2422fdd
    PE32 executable (console) Intel 80386, for MS Windows, 3 sections
    poc.sln
    0e254f7979059cd66a20a4ed75f9f4dd
    Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    video.swf
    fd9f30e2aa2bdad2692d38af262f2c88
    Macromedia Flash data (compressed), version 6
    poc.cpp
    a837d0aef2f22045bab3a3daca72678f
    C source, ASCII text, with CRLF line terminators
    poc.vcproj
    14cc4298937e314fe9982787c46030e6
    XML 1.0 document, ASCII text, with CRLF line terminators
    ReadMe.txt
    0ac8aa7c927ed09196dc3754db68cd07
    ASCII text, with CRLF line terminators
    stdafx.cpp
    a4e51692bc86c540204b09da79aa2667
    C source, ASCII text, with CRLF line terminators
    stdafx.h
    aa9c091299f07ad95bb49e6ee4bff136
    C source, ASCII text, with CRLF line terminators
    targetver.h
    ca1c19b9c013793a766ed9900d6968e0
    C source, ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Sample from CN Honker Pentest Toolset - file ms11011.exe
    Public Nextron YARA rulesmalware
    Chinese Hacktool Set - file ms11011.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
dl.packetstormsecurity.net/1011-exploits/uacpoc.zip
198.84.60.200200 OK505 kB