Report Overview

  1. Visited public
    2025-01-31 08:16:32
    Tags
  2. URL

    107.172.148.212/260/cvss.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    107.172.148.212

    #36352 AS-COLOCROSSING

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
3
Threat Detection Systems
7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
107.172.148.212unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
mediumClient IP 107.172.148.212
high 107.172.148.212Client IP
medium 107.172.148.212Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium107.172.148.212/260/cvss.exeDetects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
medium107.172.148.212/260/cvss.exeIdentifies compiled AutoIT script (as EXE).

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium107.172.148.212Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    107.172.148.212/260/cvss.exe

  2. IP

    107.172.148.212

  3. ASN

    #36352 AS-COLOCROSSING

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Size

    951 kB (951296 bytes)

  2. Hash

    94ad08c4c062395902f0babda98c66c1

    f736ee016800014779f94cdf1329519d42c092bf

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
107.172.148.212/260/cvss.exe
107.172.148.212200 OK951 kB