Report Overview

  1. Visited public
    2025-05-27 00:04:00
    Tags
    Submit Tags
  2. URL

    hangvogel.hypermart.net/dbx2mail/dbx2mail.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    38.113.1.157

    #29873 BIZLAND-SD

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
hangvogel.hypermart.netunknown1997-08-252017-02-092025-04-28

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    hangvogel.hypermart.net/dbx2mail/dbx2mail.zip

  2. IP

    38.113.1.157

  3. ASN

    #29873 BIZLAND-SD

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    257 kB (256834 bytes)

  2. Hash

    b6baebfb3352ae00f3944f9cb85f77ef

    6d632834b20d6e81c5ac740fbcd21b081b8bbe64

  1. Archive (18)

  2. FilenameMd5File type
    update.txt
    330817424873ca8266f3fdfc0981a180
    ASCII text, with very long lines (469), with CRLF line terminators
    agreement.txt
    bbca0984b311455fb2f9ba5a37bdf4e9
    ASCII text, with very long lines (397), with CRLF line terminators
    contact.txt
    e974d7637c6ecaf808c9f84de7b88781
    ASCII text, with CRLF line terminators
    contents.txt
    e6565794ad828b39c673fadd040b3c26
    ASCII text, with CRLF line terminators
    dbx2mail.exe
    56f4cd9f659d97429a3cd653a67c51f2
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
    dbx2mail.chm
    fea06a472456752341021c9663507a77
    MS Windows HtmlHelp Data
    dbx2mail.ico
    f60fb35ccbcb95b21e565d1aea96dcca
    MS Windows icon resource - 1 icon, 32x32, 16 colors
    file.txt
    18765e9a04e5f10f747cd6ef6a40a151
    ASCII text, with CRLF line terminators
    input.txt
    28a63efb69e61356c1bf2c63823fd60a
    ASCII text, with very long lines (468), with CRLF line terminators
    install.txt
    3eef3907e25aa964e3f7632d03e61083
    ASCII text, with CRLF line terminators
    introducing.txt
    b22c804d386a85ce3638332bda7b19f6
    ASCII text, with very long lines (505), with CRLF line terminators
    languages.txt
    61c651fedaca96ad0676ae5a997764b0
    ISO-8859 text, with CRLF line terminators
    options.txt
    66e8366d9df17453868fc861f903ff54
    ASCII text, with CRLF line terminators
    output.txt
    f6b209b8186e2146d0a2275eb2b8eca7
    ASCII text, with very long lines (432), with CRLF line terminators
    readme.txt
    a96da582cd1dfba6a7279659326ceafb
    ASCII text, with CRLF line terminators
    register.txt
    3a6c0eb3f1414882b21f0af7572a8399
    ASCII text, with very long lines (457), with CRLF line terminators
    require.txt
    f5c53361e42379d8ddb197ae66f1418e
    ASCII text, with CRLF line terminators
    shorthow.txt
    e34cd7e7ddc7158adf0960d1a3ec78c6
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Scans presence of the found strings using the in-house brute force method
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET hangvogel.hypermart.net/dbx2mail/dbx2mail.zip
38.113.1.157200 OK257 kB