Report Overview

  1. Visited public
    2025-02-02 06:25:25
    Tags
  2. URL

    kaliaren.com/Boy1.php.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    103.24.12.203

    #132644 PT. Cyberindo Mega Persada

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
kaliaren.comunknown2007-07-192014-11-032025-01-15

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    kaliaren.com/Boy1.php.zip

  2. IP

    103.24.12.203

  3. ASN

    #132644 PT. Cyberindo Mega Persada

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    59 kB (58913 bytes)

  2. Hash

    01ef10bed967e332ffeb7e8691883ece

    72154303a2fc2e97c327a7a4773623ab457d4416

  1. Archive (6)

  2. FilenameMd5File type
    Boy1.php
    d114324acdc501d7c01a71dfddbcdff9
    ASCII text, with very long lines (22579), with no line terminators
    index.php
    19fd42062ea1ce66806eb8d2783249f0
    PHP script, ASCII text, with CRLF line terminators
    Boy3.php
    52f736b3aa26dc221fb49d144e781bf7
    data
    privacy-modules.php
    4c14cbc1df91baaee41f3e8a9d2b31a3
    data
    index2.php
    4027633355d65b70df64ff66844b4980
    PHP script, ASCII text, with CRLF line terminators
    gacoan.php
    a1eb4e8b221fba2c5123a28c3871aeea
    PHP script, ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    PHP webshell using $a($code) for kind of eval with encoded blob to decode, e.g. b374k
    Public Nextron YARA rulesmalware
    PHP webshell using some kind of eval with encoded blob to decode
    Public Nextron YARA rulesmalware
    PHP webshell using $a($code) for kind of eval with encoded blob to decode, e.g. b374k
    Public Nextron YARA rulesmalware
    php webshell containing base64 encoded payload
    Public Nextron YARA rulesmalware
    Known PHP Webshells which contain unique strings, lousy rule for low hanging fruits. Most are catched by other rules in here but maybe these catch different versions.
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
kaliaren.com/Boy1.php.zip
103.24.12.203200 OK59 kB