Report Overview
Visitedpublic
2024-07-06 21:22:38
Tags
Submit Tags
URL
45.207.168.120:7744/1111222222222.zip
Finishing URL
about:privatebrowsing
IP / ASN

45.207.168.120
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
2
Threat Detection Systems
5
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
r10.o.lencr.org | unknown | 2020-06-29 | 2024-06-06 21:45:11 | 2024-07-06 18:12:32 | 981 B | 2.7 kB | ![]() 23.36.77.32 | |
45.207.168.120:7744 1 alert(s) on this Domain | unknown | unknown | No data | No data | 407 B | 5.8 MB | ![]() 45.207.168.120 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Timestamp | Severity | Source IP | Destination IP | Alert |
---|---|---|---|---|
medium | Client IP | ![]() 45.207.168.120 | ET INFO Dotted Quad Host ZIP Request | |
high | ![]() 45.207.168.120 | Client IP | ET HUNTING Rejetto HTTP File Sever Response |
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2024-07-06 | medium | 45.207.168.120 | Sinkholed |
ThreatFox
No alerts detected
File detected
URL
45.207.168.120:7744/1111222222222.zip
IP / ASN

45.207.168.120
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size5.8 MB (5807959 bytes)
MD5e97e5dcbfb2bb44d889df3124903bfb1
SHA1166f7d7d1ec12009167db7ebe862d80f7ab3fbb2
Archive (13)
Filename | MD5 | File type |
---|---|---|
2.bat | 9366387efaf029defa1d92ebec9be843 | ASCII text, with CRLF line terminators |
Disable Lusrmgr.reg | b1efa56d1bba81c09ddf7b61c2e2e567 | Windows Registry little-endian text (Win2K or above) |
LogDelete.bat | fb9c610ba195f9b18a96b84c5e755df7 | ASCII text, with no line terminators |
mm.exe | a913d7c91e9129b03e4992a42b4040e0 | PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections |
utilman.exe | 6172e9bd077d91af0356855e8e74ae59 | PE32+ executable (console) x86-64, for MS Windows, 3 sections |
�ر��¼��鿴��.reg | 63fd770ce885559746a4763918a7ae79 | Windows Registry text (Win2K or above) |
1�Ҽ��Թ���Ա��������.bat | 121dbfd80566ba06deb84a0149b9805f | DOS batch file, ASCII text, with CRLF line terminators |
dfControl.exe | 10d8e4ca3fa2902859c77f41baee4dda | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections |
dfControl.ini | e67af98f9f4ef6f902820917ab5d763b | Unicode text, UTF-16, little-endian text, with CRLF line terminators |
install_wim_tweak.exe | ba352663c76c86c10a8d5c7b7a47f3c5 | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Uninstall.cmd | 05e34e86c455fc1d2373333612247b9e | DOS batch file, ISO-8859 text, with CRLF line terminators |
�½��ı��ĵ�.txt | d341bd554c34bdf64a5eb1ffb3922b74 | Unicode text, UTF-8 text, with CRLF line terminators |
������������.reg | 94cc68800133d89ee0f4b307de8ecece | Windows Registry text (Win2K or above) |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects malware by known bad imphash or rich_pe_header_hash |
JavaScript (0)
No Javascripts found
No JavaScripts
HTTP Transactions (4)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
r10.o.lencr.org/ | ![]() | 504 B | ||||||||
URL r10.o.lencr.org/ IP / ASN ![]() 23.36.77.32 Requested byN/A Resource Info File typedata First Seen2024-07-05 Last Seen2024-08-19 Times Seen43182 Size504 B (504 bytes) MD5508d0867e7982df7cfa6ad58e05ce470 SHA16f4e15b94e527d02e8dd38f8b69b493cfae84c56 SHA256376a5286b71a4a7e90b3eece9b39480f50435d5ef3c7793828481f590d04bc77 HTTP Headers
| ||||||||||
r10.o.lencr.org/ | ![]() | 504 B | ||||||||
URL r10.o.lencr.org/ IP / ASN ![]() 23.36.76.226 Requested byN/A Resource Info File typedata First Seen2024-07-05 Last Seen2024-08-19 Times Seen44889 Size504 B (504 bytes) MD5861cce1bf441610f1dfbb14264d55122 SHA11596b2c44fcdb5f7a49c73da766e4ab48b6bd064 SHA256f67d59f3fddbcaf61f9f1aa87eca02a320f59402bb412687a4db4d8aa81867d2 HTTP Headers
| ||||||||||
r10.o.lencr.org/ | ![]() | 504 B | ||||||||
URL r10.o.lencr.org/ IP / ASN ![]() 23.36.76.226 Requested byN/A Resource Info File typedata First Seen2024-07-05 Last Seen2024-08-19 Times Seen44889 Size504 B (504 bytes) MD5861cce1bf441610f1dfbb14264d55122 SHA11596b2c44fcdb5f7a49c73da766e4ab48b6bd064 SHA256f67d59f3fddbcaf61f9f1aa87eca02a320f59402bb412687a4db4d8aa81867d2 HTTP Headers
| ||||||||||
GET 45.207.168.120:7744/1111222222222.zip | ![]() | 200 OK | 5.8 MB | |||||||
URL 45.207.168.120:7744/1111222222222.zip IP / ASN ![]() 45.207.168.120 Requested byN/A Resource Info File typeZip archive data, at least v2.0 to extract, compression method=deflate First Seen2024-08-19 Last Seen2024-08-19 Times Seen1 Size5.8 MB (5807959 bytes) MD5e97e5dcbfb2bb44d889df3124903bfb1 SHA1166f7d7d1ec12009167db7ebe862d80f7ab3fbb2 SHA256feab3a7d78c04007af684425dd60df3c8707e143b86481cb30e2c105118e3b99 Detections
HTTP Headers
| ||||||||||