Report Overview

  1. Visited public
    2025-01-22 21:24:28
    Tags
  2. URL

    down.fwqlt.com/DXL_Win_Tool_V9.6.iso

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    104.243.129.2

    #26658 HENGTONG-IDC-LLC

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
2
Threat Detection Systems
10

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
down.fwqlt.comunknown2012-12-202022-10-032025-01-22

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
highClient IP 104.243.129.2
low 104.243.129.2Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumdown.fwqlt.com/DXL_Win_Tool_V9.6.isoDetect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
mediumdown.fwqlt.com/DXL_Win_Tool_V9.6.isoIdentifies AutoIT script.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    down.fwqlt.com/DXL_Win_Tool_V9.6.iso

  2. IP

    104.243.129.2

  3. ASN

    #26658 HENGTONG-IDC-LLC

  1. File type

    ISO 9660 CD-ROM filesystem data 'DXL_WIN_TOOL_V9.6'

    Size

    8.4 MB (8372224 bytes)

  2. Hash

    7fe47bdb5330179681299ede0d3a8993

    085fcfc707e661fc3ac27a5fa3f27e11451d2f18

  1. Archive (2)

  2. FilenameMd5File type
    PORT����.BAT
    52c1615ce1bd99130d2796825e009954
    DOS batch file, ISO-8859 text, with CRLF line terminators
    WINDOWS .EXE
    06b5b35c6820c5ac2778c0dccdfc972a
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Public InfoSec YARA rulesmalware
    Identifies AutoIT script.
    VirusTotalmalicious
    ClamAVmalicious
    Win.Tool.Productkey-14

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
down.fwqlt.com/
104.243.129.2200 OK11 kB
down.fwqlt.com/DXL_Win_Tool_V9.6.iso
104.243.129.2200 OK8.4 MB