| zfhelp.top/cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D | 172.67.156.13 | 403 Forbidden | 151 B |
URL User Request GET zfhelp.top/cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D IP 172.67.156.13:80
File typeHTML document, ASCII text, with CRLF line terminators Hashc371fa8374a06a3c0535fc341d454236 441671eacb9398792d435443beaddd3fc5fa1910 eed0b81a2fbdd1c5a9f80705885fc5bbf346ba428a79ff7a13ec8491c6a8e96c
Analyzer | Verdict | Alert | ThreatFox | malicious | Unknown RAT | Quad9 DNS | malicious | Sinkholed |
NIDS | Severity | Alert | suricata | high | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 | suricata | medium | ET INFO HTTP Request to a *.top domain |
GET /cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D HTTP/1.1
Host: zfhelp.top
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 403 Forbidden
Date: Mon, 07 Apr 2025 11:49:16 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Server: cloudflare
CF-RAY: 92c94cf84a7d5696-OSL
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Content-Encoding: gzip
|
IP 172.67.156.13:80
Requested byhttp://zfhelp.top/cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D
File typeHTML document, ASCII text, with very long lines (394) Hash2581c3f028c4de2af0534bc2b4cc3bbf c6ef3aa17a06495b70e0263520b64e682602e765 53681568422a9af8eb183850903d29fd58e68968b1e1b97429b6c2318b53d165
Analyzer | Verdict | Alert | ThreatFox | malicious | Unknown RAT | Quad9 DNS | malicious | Sinkholed |
GET /favicon.ico HTTP/1.1
Host: zfhelp.top
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Referer: http://zfhelp.top/cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 403 Forbidden
Date: Mon, 07 Apr 2025 11:49:16 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: max-age=15
Expires: Mon, 07 Apr 2025 11:49:31 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OdQWsWrbW%2FsCoooFEMFBvTtOAv2NAdonQcow38h4Vh2W2sm7TSst9hyRSAAUJ1qnE0LbRPJc9lyuL79Q9Wm52gSte6Zvjb4QxCSCSVg68B1QEN2daWEw98JkNRMd"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Vary: Accept-Encoding
Server: cloudflare
CF-RAY: 92c94cf97cb95696-OSL
Content-Encoding: gzip
alt-svc: h2=":443"; ma=60
server-timing: cfL4;desc="?proto=TCP&rtt=504&min_rtt=414&rtt_var=185&sent=4&recv=6&lost=0&retrans=0&sent_bytes=395&recv_bytes=1040&delivery_rate=6122621&cwnd=251&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
|
| zfhelp.top/cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D | 172.67.156.13 | 403 Forbidden | 4.5 kB |
URL User Request GET zfhelp.top/cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D IP 172.67.156.13:443
CertificateIssuerGoogle Trust Services Subjectzfhelp.top Fingerprint09:56:DA:72:A9:2F:B6:E3:5E:2F:DA:BA:80:5F:5D:2F:04:6E:87:25 ValidityWed, 05 Mar 2025 22:02:35 GMT - Tue, 03 Jun 2025 23:00:12 GMT
File typeHTML document, ASCII text, with very long lines (396) Hash3347d2080383786bce45ee79d53a4a22 7e777899788ff25737c3acdfdfbe99c678e119af 952a5d9f6bf51322f1360b90f83c79a70dfd2aaf66e6963388c524c5e5facc31
Analyzer | Verdict | Alert | ThreatFox | malicious | Unknown RAT | Quad9 DNS | malicious | Sinkholed |
NIDS | Severity | Alert | suricata | high | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 | suricata | medium | ET INFO HTTP Request to a *.top domain |
GET /cdn-cgi/phish-bypass?atok=0GmVi4VYlQR0aH7nzjnaCi1.szbE4g8Akyc71AHQS0M-1743953640.75402-0.0.1.1-%2Fbin%2Fsupport.client.exe%3Fi%3D%26e%3DSupport%26y%3DGuest%26r%3D HTTP/1.1
Host: zfhelp.top
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 403 Forbidden
date: Mon, 07 Apr 2025 11:49:16 GMT
content-type: text/html; charset=UTF-8
x-frame-options: SAMEORIGIN
content-encoding: br
server: cloudflare
cf-ray: 92c94cf748386a63-HAM
X-Firefox-Spdy: h2
|