Report Overview
Visitedpublic
2024-12-30 14:20:20
Tags
Submit Tags
URL
www.morkoskhalaf.com/ankhtech/Toolbox/Tweaks.exe
Finishing URL
about:privatebrowsing
IP / ASN

104.21.90.214
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
www.morkoskhalaf.com 1 alert(s) on this Domain | unknown | 2020-03-24 | 2023-03-28 | 2023-03-28 | 502 B | 610 kB | ![]() 104.21.90.214 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
No alerts detected
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
File detected
URL
www.morkoskhalaf.com/ankhtech/Toolbox/Tweaks.exe
IP / ASN

104.21.90.214
File Overview
File Type7-zip archive data, version 0.4
Size609 kB (609033 bytes)
MD5d3b4b4e86177e8db07fa2594d792a8aa
SHA1893f17d914dcc0627c5d2068fe17f501f675078e
Archive (16)
Filename | MD5 | File type |
---|---|---|
ActCheck.bat | 67c9648fb8aafeafb0c4932c4a7693c5 | ASCII text, with very long lines (361), with CRLF line terminators |
Activate_Windows_Photo_Viewer.reg | b083ee8e2da4099509b35ca612cceea4 | Windows Registry little-endian text (Win2K or above) |
pkey.txt | 374a52820bbe07516b9c1ec16d72d24e | ASCII text, with very long lines (4860), with CRLF line terminators |
revouninstallerpro5.lic | 8462a9b69c76a9603a4143d51fbc201e | data |
Smadavx64.reg | 1ba01e5da3ab531c59d7a99e5a4e2947 | Windows Registry little-endian text (Win2K or above) |
Add_Take_Ownership.reg | 57960ab7d086057a63ff1dd93d491ff2 | Windows Registry little-endian text (Win2K or above) |
CleanOffice.txt | e26af0413350bfb88fdb0d5cbded8596 | ASCII text, with CRLF line terminators |
KMS.xml | 672791216f102bdb76fb550adb0ea923 | XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators |
Hash.reg | 30fee4c3f420a7d7cd4dc23ca2e2f90d | Windows Registry little-endian text (Win2K or above) |
IAS.cmd | f9a5ab68258deddf28f0d936d0ee00aa | DOS batch file, ASCII text, with very long lines (324), with CRLF line terminators |
MAS_AIO.cmd | 92cc8f1f67a875563d1299e7dd7b5723 | DOS batch file, ASCII text, with very long lines (311), with CRLF line terminators |
run.bat | 95c66d1c6b68d200688fe4ceffbf0d32 | exported SGML document, Non-ISO extended-ASCII text, with CRLF line terminators |
SafeMode.reg | d7f56743aa26f28dd825aa6b5ea4a438 | Windows Registry little-endian text (Win2K or above) |
version.dll | 682f8677112feeaeb0a6b268d21a8551 | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 9 sections |
x64.dll | a8f669ab8fad00bd193a82b8f62e7660 | PE32+ executable (DLL) (native) x86-64, for MS Windows, 5 sections |
x86.dll | fee7e8f5472041f6b2c0e5d8f8d0da45 | PE32 executable (DLL) (native) Intel 80386, for MS Windows, 5 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
ClamAV | malicious | Win.Trojan.Generic-10036804-0 |
JavaScript (0)
No Javascripts found
No JavaScripts
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
GET www.morkoskhalaf.com/ankhtech/Toolbox/Tweaks.exe | ![]() | 200 OK | 609 kB | |||||||
URL www.morkoskhalaf.com/ankhtech/Toolbox/Tweaks.exe IP / ASN ![]() 104.21.90.214 Requested byN/A Resource Info File type7-zip archive data, version 0.4 First Seen2024-12-30 Last Seen2025-02-05 Times Seen3 Size609 kB (609033 bytes) MD5d3b4b4e86177e8db07fa2594d792a8aa SHA1893f17d914dcc0627c5d2068fe17f501f675078e SHA2561d5ad6f089cd8b0a912872fcc9c440e5d76c52de6b4ab5a5e0ca9c1df90e0409 Certificate Info IssuerGoogle Trust Services Subjectwww.morkoskhalaf.com Fingerprint42:06:78:BE:4C:AF:F7:0A:10:EB:79:6F:1D:37:0F:2C:B0:BF:ED:FB ValidityFri, 01 Nov 2024 17:55:08 GMT - Thu, 30 Jan 2025 17:55:07 GMT Detections
HTTP Headers
| ||||||||||