Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
files.fluxus-team.net | unknown | 2024-03-19 | 2024-11-15 | 2025-01-20 | 501 B | 2.4 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
files.fluxus-team.net/Fluxus_Executor_Linux.zip
IP
188.114.96.1
ASN
#13335 CLOUDFLARENET
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
2.4 MB (2377303 bytes)
Hash
0ae0a6a9b090ff1645468003f45c4966
08f3983824bf49b1b6ea24b8e60c9ed1b026d0ab
Archive (1)
Filename | Md5 | File type | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Fluxus V7.exe | b4f9cbca656fd34c4dbb1d706a7f1ad3
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN) |
YARAhub by abuse.ch | malware | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
files.fluxus-team.net/Fluxus_Executor_Linux.zip | ![]() | 200 OK | 2.4 MB | |||||||
Detections
HTTP Headers
| ||||||||||