Report Overview

  1. Visited public
    2025-01-03 22:24:58
    Tags
    Submit Tags
  2. URL

    technotraps.org/wp-content/uploads/2024/09/TestMem5-v0.12-Many-configs-repackaged.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    81.169.145.72

    #6724 Strato AG

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
technotraps.orgunknown2023-01-182023-01-192024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    technotraps.org/wp-content/uploads/2024/09/TestMem5-v0.12-Many-configs-repackaged.zip

  2. IP

    81.169.145.72

  3. ASN

    #6724 Strato AG

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    34 kB (34154 bytes)

  2. Hash

    9ee0eec06bc443d0e9ad6a21c4a25896

    5004ecf6e7d7789be3125fa4eaa1c4a926eb470f

  1. Archive (16)

  2. FilenameMd5File type
    1usmus_v3.cfg
    5703389ef9c64c8266ddfd07e5c1f050
    ASCII text, with CRLF line terminators
    2020high@anta777.cfg
    8bf40e3a762f93d84d9bb22c6e386205
    ASCII text, with CRLF line terminators
    2020low@anta777.cfg
    9af535c1e3c504e0fed1e6885f013d9e
    ASCII text, with CRLF line terminators
    2020medium@anta777.cfg
    106636df50db900c1b8694f04e1d3b8a
    ASCII text, with CRLF line terminators
    absolutnew.cfg
    4b2a885dff7d438fa25e2d0caea22a9f
    ASCII text, with CRLF line terminators
    Extreme1@anta777.cfg
    3ab536abe742f644c8ef3d6ecc854dac
    ASCII text, with CRLF line terminators
    Extreme1overnight@anta777.cfg
    c38b800adfad8c24b390cc491a74ccb0
    Unicode text, UTF-8 text, with CRLF line terminators
    Heavy5opt@anta777.cfg
    b4fae4ec786ebeda5cb74654a8240a00
    ASCII text, with CRLF line terminators
    Light1@anta777.cfg
    f7be3bd4855c46ba2fb601c819a29579
    ASCII text, with CRLF line terminators
    MT.cfg
    7d37c97265204a574035b82ccce9d2e4
    ASCII text, with CRLF line terminators
    MT0.dll
    47f6806d74205f0ece372d96d0634ea3
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    Ollie.cfg
    39aa3378d8a7f91f6ce8cbd7d54ee7b0
    ASCII text, with CRLF line terminators
    PCBdestroyer.cfg
    27661be00bfc03ecb254404b7740c115
    ASCII text, with CRLF line terminators
    SuperLight2@anta777.cfg
    2b6b18ac36e6aaa5db3f673127ca18b9
    ASCII text, with CRLF line terminators
    Universal-2LMhz.cfg
    e5af2bb3d49aeb8b5dc19c7efb1b3538
    ASCII text, with CRLF line terminators
    TM5.exe
    c5cd49bcf5fc17944383d387638c955e
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET technotraps.org/wp-content/uploads/2024/09/TestMem5-v0.12-Many-configs-repackaged.zip
81.169.145.72200 OK34 kB