Report Overview
Visitedpublic
2024-07-06 21:22:38
Tags
Submit Tags
URL
45.207.168.120:7744/1111222222222.zip
Finishing URL
about:privatebrowsing
IP / ASN
45.207.168.120
#21859 ZEN-ECN
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
2
Threat Detection Systems
5

Host Summary

HostRankRegisteredFirst SeenLast Seen
r10.o.lencr.org
unknown2020-06-292024-06-06 21:45:112024-07-06 18:12:32
45.207.168.120:7744
unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
mediumClient IP
45.207.168.120
ET INFO Dotted Quad Host ZIP Request
high
45.207.168.120
Client IPET HUNTING Rejetto HTTP File Sever Response

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium45.207.168.120Sinkholed

ThreatFox

No alerts detected


File detected

URL
45.207.168.120:7744/1111222222222.zip
IP / ASN
45.207.168.120
#21859 ZEN-ECN
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size5.8 MB (5807959 bytes)
MD5e97e5dcbfb2bb44d889df3124903bfb1
SHA1166f7d7d1ec12009167db7ebe862d80f7ab3fbb2
Archive (13)
FilenameMD5File type
2.bat9366387efaf029defa1d92ebec9be843ASCII text, with CRLF line terminators
Disable Lusrmgr.regb1efa56d1bba81c09ddf7b61c2e2e567Windows Registry little-endian text (Win2K or above)
LogDelete.batfb9c610ba195f9b18a96b84c5e755df7ASCII text, with no line terminators
mm.exea913d7c91e9129b03e4992a42b4040e0PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections
utilman.exe6172e9bd077d91af0356855e8e74ae59PE32+ executable (console) x86-64, for MS Windows, 3 sections
�ر��¼��鿴��.reg63fd770ce885559746a4763918a7ae79Windows Registry text (Win2K or above)
1�Ҽ��Թ���Ա��������.bat121dbfd80566ba06deb84a0149b9805fDOS batch file, ASCII text, with CRLF line terminators
dfControl.exe10d8e4ca3fa2902859c77f41baee4ddaPE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
dfControl.inie67af98f9f4ef6f902820917ab5d763bUnicode text, UTF-16, little-endian text, with CRLF line terminators
install_wim_tweak.exeba352663c76c86c10a8d5c7b7a47f3c5PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
Uninstall.cmd05e34e86c455fc1d2373333612247b9eDOS batch file, ISO-8859 text, with CRLF line terminators
�½��ı��ĵ�.txtd341bd554c34bdf64a5eb1ffb3922b74Unicode text, UTF-8 text, with CRLF line terminators
������������.reg94cc68800133d89ee0f4b307de8ececeWindows Registry text (Win2K or above)

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Detects malware by known bad imphash or rich_pe_header_hash

JavaScript (0)

HTTP Transactions (4)

URLIPResponseSize
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.76.226 504 B
r10.o.lencr.org/
23.36.76.226 504 B
GET 45.207.168.120:7744/1111222222222.zip
45.207.168.120200 OK5.8 MB