Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
r10.o.lencr.org | unknown | 2020-06-29 | 2024-06-06 21:45:11 | 2024-10-07 19:37:44 | 327 B | 887 B | ![]() |
framerusercontent.com | unknown | 2019-04-29 | 2019-05-01 19:48:10 | 2024-10-06 09:07:54 | 512 B | 3.5 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
framerusercontent.com/assets/0BtJZZiSWxlSxXACZL0gGv7zE.zip
IP
3.164.68.90
ASN
#0
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
3.5 MB (3497899 bytes)
Hash
22f5802fe4cd75f2304d9c8bd1c35ce5
fb406d25967e8925b1952c5700264bd201afef31
Archive (16)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
KrnlAPI.dll | e0a4637091c41436faafd345ee2aa9b2
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
NOVAX.dll | 26ba4c434ddff8345d0c91d661a81695 | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections | ||||||
NyxAPI.dll | 44127e4fe041bb37416131bd62b3f754
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Siticone.Desktop.UI.dll | 57fc4e4d25e1ed835fb3debf621c4a4d | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Siticone.UI.dll | 750c58af2e56b6addecffcf152520ab8
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Terminus V2.exe | e0dbcad74b59fb0fdbb539c21f94513b
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Terminus V2.exe.config | 15c8c4ba1aa574c0c00fd45bb9cce1ab | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | ||||||
Terminus V2.pdb | d67e01ea6431632c688f48f7b38d97e8 | MSVC program database ver 7.00, 512*207 bytes | ||||||
VisualStudioTabControl.dll | 365be8c17e1cce92c530abaf16d4c709 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
WeAreDevs_API.dll | be229ec036e67368650219ec91b0f08c
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
autoattach | 68934a3e9455fa72420237eb05902327 | ASCII text, with no line terminators | ||||||
topmost | d41d8cd98f00b204e9800998ecf8427e | |||||||
rbxfpsunlocker.exe | 09d083f0e2c1e8a3561209902333ad8f
| PE32+ executable (GUI) x86-64, for MS Windows, 7 sections | ||||||
CeleryAPI (1).dll | 99a217bdc8c685c3b0a319d9ea8a14db
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Guna.UI2.dll | c97f23b52087cfa97985f784ea83498f
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Hovac_API.dll | fd6d62736b57c4cdc6239100d26c7004
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | meth_get_eip |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
r10.o.lencr.org/ | ![]() | 504 B | ||||||||
HTTP Headers
| ||||||||||
framerusercontent.com/assets/0BtJZZiSWxlSxXACZL0gGv7zE.zip | ![]() | 200 OK | 3.5 MB | |||||||
Detections
HTTP Headers
| ||||||||||