Report Overview
Visitedpublic
2024-12-19 22:03:39
Tags
Submit Tags
URL
185.158.248.133/%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%B0_19%2012%202024.zip
Finishing URL
about:privatebrowsing
IP / ASN
185.158.248.133
#9009 M247 Europe SRL
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
2
Threat Detection Systems
10

Host Summary

HostRankRegisteredFirst SeenLast Seen
185.158.248.133
unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
mediumClient IP
185.158.248.133
ET INFO Dotted Quad Host ZIP Request
low
185.158.248.133
Client IPET HUNTING SUSPICIOUS .LNK File Inside of Zip

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium185.158.248.133/%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%B0_19%2012%202024.zipDetects suspicious tiny ZIP files with phishing attachment characteristics
medium185.158.248.133/%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%B0_19%2012%202024.zipDetects suspicius tiny ZIP files with malicious lnk files

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium185.158.248.133Sinkholed

ThreatFox

No alerts detected


File detected

URL
185.158.248.133/%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%B0_19%2012%202024.zip
IP / ASN
185.158.248.133
#9009 M247 Europe SRL
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size916 B (916 bytes)
MD54715f0acc8048ca3424023b4149845ef
SHA161bea4e41f3d1457950213ae313debe53716bbe6
Archive (1)
FilenameMD5File type
program_19_12_2024.lnk03bd5bd30d680541e8d91ad38021d7ffMS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=11, Unicoded, MachineID vps-330874 KnownFolderID 1AC14E77-02E7-4E5D-B744-2EB1AE5198B7, Archive, ctime=Sat Sep 15 07:14:14 2018, atime=Sat Sep 15 07:14:14 2018, mtime=Sat Sep 15 07:14:14 2018, length=448000, window=showminnoactive, IDListSize 0x020d, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"

Detections

AnalyzerVerdictAlert
Public InfoSec YARA rulesmalware
Identifies PowerShell artefacts in shortcut (LNK) files.
Public InfoSec YARA rulesmalware
Identifies scripting artefacts in shortcut (LNK) files.
Public InfoSec YARA rulesmalware
Identifies executable artefacts in shortcut (LNK) files.
Public InfoSec YARA rulesmalware
Identifies download artefacts in shortcut (LNK) files.
Public Nextron YARA rulesmalware
Detects suspicious tiny ZIP files with phishing attachment characteristics
YARAhub by abuse.chmalware
Detects suspicius tiny ZIP files with malicious lnk files

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET 185.158.248.133/%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%B0_19%2012%202024.zip
185.158.248.133200 OK916 B