Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
amnesiarat.netlify.app | unknown | 2018-05-08 | 2025-01-05 | 2025-05-09 | 505 B | 19 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
amnesiarat.netlify.app/amnesiarat.zip
IP
3.124.100.143
ASN
#16509 AMAZON-02
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
19 MB (19134908 bytes)
Hash
6fb2d50e0452c5c965589d119f089066
97a606d5b2a96825b8ec1d6d55a1e55714d58129
Archive (46)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
amnesiarat.py | 3de6a08deaf346b750b95245b71a0462 | Python script, Unicode text, UTF-8 text executable, with very long lines (17151), with CRLF line terminators | ||||||
builder.bat | e6b2a2ca5edf513b02534d7105f20e8f | DOS batch file, ASCII text, with CRLF line terminators | ||||||
7zxa.dll | 85026cfba1afed081a84f70c3cf46815 | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections | ||||||
Default.SFX | 224f78b66ec07b08edc62ca0868ded3e
| PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections | ||||||
Default64.SFX | 34fad68e2cf5ede0c5ab7ea6d1dc8235
| PE32+ executable (GUI) x86-64, for MS Windows, 8 sections | ||||||
DefaultEn.SFX | 120508b3b012c40cf5e5acbcc573c586
| PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections | ||||||
DefaultEn64.SFX | c8c0d9bcc38b11ae30033724290f523d
| PE32+ executable (GUI) x86-64, for MS Windows, 8 sections | ||||||
Descript.ion | bceb17e978667343d2bae6417a07736b | Non-ISO extended-ASCII text | ||||||
icon.ico | 99e1bdaa6743d38327e9acd482f5f297 | MS Windows icon resource - 1 icon, 32x64, 8 bits/pixel | ||||||
main.py | 9b7501423e47e2367d8630517729870a | Python script, ASCII text executable | ||||||
Order.htm | 51402d8c1114647287c649d27bfc1800 | HTML document, Non-ISO extended-ASCII text | ||||||
rar | d41d8cd98f00b204e9800998ecf8427e | |||||||
Rar.exe | f7c0c38bdf23992fc92ca8a55afa28f2
| PE32+ executable (console) x86-64, for MS Windows, 7 sections | ||||||
Rar.txt | 4daaf310174662a8b20ad452d74ece05 | Unicode text, UTF-16, little-endian text, with CRLF line terminators | ||||||
RarExt.dll | d0f4632be7031cc372ffdd2d9063ffb2
| PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections | ||||||
RarExt32.dll | 8510bea1dc5a2245a72dfe5ecd20cda6
| PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections | ||||||
RarExtInstaller.exe | 1e1cac0725cf47e62ea96669eac678fc
| PE32+ executable (GUI) x86-64, for MS Windows, 7 sections | ||||||
RarExtLogo.altform-unplated_targetsize-32.png | 85ee643e6b0837849e300b11395422c4 | PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced | ||||||
RarExtLogo.altform-unplated_targetsize-48.png | ec177cbe676473543e8c9b5d9fb0b797 | PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced | ||||||
RarExtLogo.altform-unplated_targetsize-64.png | 248fa2b659874a14b43b5e0e17ac1cff | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | ||||||
RarExtPackage.msix | 9301f2ad24daa60404407053635cb2ad | Zip archive data, at least v4.5 to extract, compression method=store | ||||||
RarFiles.lst | eb527f9c93ea1582a4bd650378832fb2 | ISO-8859 text | ||||||
RarLng.dll | 9f4c05a96dc3da20b2ef7a353f1d0dca
| PE32 executable (DLL) (GUI) Intel 80386, for MS Windows | ||||||
rarnew.dat | c69d0b5902a959577c02e9dcdda77de0 | RAR archive data, v5 | ||||||
rarreg.key | 4dab4191209c461c1b902e85d9a18407 | ASCII text | ||||||
Resources.pri | 43cb15c1f1cc705305aeba33b0a9ee73 | data | ||||||
setup.sfx | b8d3ebc24b31b88f6299e1dd809a6486 | ASCII text | ||||||
Uninstall.exe | 62c61b5bc915f81c8038aa83ed1a3b01
| PE32+ executable (GUI) x86-64, for MS Windows, 7 sections | ||||||
Uninstall.lst | 76e0a4ddf972478bc276a50f05314ad0 | ASCII text | ||||||
UnRAR.exe | 1ee4846cca962f50c85ae93af0376bd1
| PE32+ executable (console) x86-64, for MS Windows, 7 sections | ||||||
WhatsNew.txt | e2226e8c1fe0ad060f9ed0d74fedf838 | Unicode text, UTF-16, little-endian text, with CRLF line terminators | ||||||
WinCon.SFX | ecf56993b7a05885da9197cd36135cde
| PE32 executable (console) Intel 80386, for MS Windows, 6 sections | ||||||
WinCon64.SFX | a8d5219f446d3c03fa87b4e6ee0c85ae | PE32+ executable (console) x86-64, for MS Windows, 8 sections | ||||||
WinConEn.SFX | d27a3d83167276da2847ec3d385446f7
| PE32 executable (console) Intel 80386, for MS Windows, 6 sections | ||||||
WinConEn64.SFX | e882e0122566f8284f1da272b00d50e9 | PE32+ executable (console) x86-64, for MS Windows, 8 sections | ||||||
WinRAR.exe | 3daf58b12efdae4d43032ef96895ba58
| PE32+ executable (GUI) x86-64, for MS Windows, 8 sections | ||||||
xfs.conf | b6bd309ac043de72d149521717201613 | ASCII text, with CRLF line terminators | ||||||
xfs_backup.conf | b6bd309ac043de72d149521717201613 | ASCII text, with CRLF line terminators | ||||||
Zip.SFX | 32389d929fb42fabcd772ba3cbaf24a4
| PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections | ||||||
Zip64.SFX | 9d8ef4e94b72611c084a401e530c9fff
| PE32+ executable (GUI) x86-64, for MS Windows, 8 sections | ||||||
ZipEn.SFX | dd5e37cb05ef290b830e9c031b3baded
| PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections | ||||||
ZipEn64.SFX | 8f8cdb74d018e6daa4181944a9308fc4
| PE32+ executable (GUI) x86-64, for MS Windows, 8 sections | ||||||
zipnew.dat | 76cdb2bad9582d23c1f6f4d868218d6c | Zip archive data (empty) | ||||||
obf.py | 7a337ebe9063d262a8e61400a5e8b609 | Python script, Unicode text, UTF-8 text executable, with CRLF line terminators | ||||||
builder.py | 8a1134c83203b97b466c86a1b7a9ee6d | Python script, Unicode text, UTF-8 text executable, with very long lines (65201), with CRLF line terminators | ||||||
main.py | 5c619606da307819784d99db673bf3f2 | ASCII text, with CRLF line terminators |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
amnesiarat.netlify.app/amnesiarat.zip | ![]() | 200 OK | 19 MB | |||||||
Detections
HTTP Headers
| ||||||||||