Overview

URL rj.airvr.cc/81.exe
IP125.141.63.107
ASNAS4766 Korea Telecom
Location Korea, Republic of
Report completed2019-05-26 17:39:29 CEST
StatusLoading report..
urlquery Alerts No alerts detected


Settings

UserAgentMozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13
Referer
Pool
Access Level


Intrusion Detection Systems

Suricata /w Emerging Threats Pro
Timestamp Severity Source IP Destination IP Alert
2019-05-26 17:38:59 CEST 1  125.141.63.107 Client IP ET POLICY PE EXE or DLL Windows file download HTTP
2019-05-26 17:38:59 CEST 1  125.141.63.107 Client IP ET TROJAN JS/Nemucod.M.gen downloading EXE payload
2019-05-26 17:39:03 CEST 3  125.141.63.107 Client IP ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
2019-05-26 17:38:58 CEST 1 Client IP  125.141.63.107 ET TROJAN JS/Nemucod requesting EXE payload 2016-02-01


Blacklists

MDL  No alerts detected
OpenPhish  No alerts detected
PhishTank  No alerts detected
Fortinet's Web Filter
Added / Verified Severity Host Comment
2019-05-26 2 rj.airvr.cc/81.exe Malware
DNS-BH  No alerts detected
mnemonic secure dns  No alerts detected


Recent reports on same IP/ASN/Domain

Last 7 reports on IP: 125.141.63.107

Date UQ / IDS / BL URL IP
2019-05-26 13:45:50 +0200
0 - 0 - 1 rj.airvr.cc/81.exe 125.141.63.107
2019-05-26 11:47:47 +0200
0 - 4 - 1 rj.airvr.cc/81.exe 125.141.63.107
2019-05-11 19:31:51 +0200
0 - 4 - 1 rj.airvr.cc/81.exe 125.141.63.107
2019-03-12 06:51:12 +0100
0 - 0 - 1 rj.airvr.cc/81.exe 125.141.63.107
2019-01-24 03:50:46 +0100
0 - 0 - 1 rj.airvr.cc/81.exe 125.141.63.107
2018-12-13 10:34:00 +0100
0 - 4 - 1 rj.airvr.cc/81.exe 125.141.63.107
2018-05-19 04:31:01 +0200
0 - 4 - 1 rj.airvr.cc/81.exe 125.141.63.107

Last 10 reports on ASN: AS4766 Korea Telecom

Date UQ / IDS / BL URL IP
2019-06-27 12:55:11 +0200
0 - 0 - 0 121.136.156.51 121.136.156.51
2019-06-27 10:21:10 +0200
0 - 1 - 0 https://chogoon.com/srt/4bxbt 222.122.84.56
2019-06-27 02:47:20 +0200
0 - 0 - 7 infodot.tistory.com 211.231.99.250
2019-06-26 21:10:58 +0200
0 - 0 - 1 www.portal.discover.com.cbe.com.vn/customersvcs/ 112.175.114.36
2019-06-26 20:54:59 +0200
0 - 0 - 0 https://www.nims.or.kr 14.56.119.21
2019-06-26 17:07:30 +0200
0 - 0 - 0 bitly.kr/0H3npL 175.207.13.31
2019-06-26 15:35:20 +0200
0 - 0 - 0 https://www.nims.or.kr 14.56.119.21
2019-06-26 09:40:47 +0200
0 - 0 - 0 183.110.235.190 183.110.235.190
2019-06-26 04:55:01 +0200
0 - 0 - 0 pds23.egloos.com/ 125.141.132.101
2019-06-26 03:10:27 +0200
0 - 0 - 0 www.docfinderkorea.com 119.205.197.119

No other reports on domain: airvr.cc



JavaScript

Executed Scripts (0)


Executed Evals (0)


Executed Writes (0)



HTTP Transactions (1)


Request Response
                                        
                                            GET /81.exe HTTP/1.1 
Host: rj.airvr.cc
                                        
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive

                                         
                                         125.141.63.107
HTTP/1.1 200 OK
Content-Type: application/octet-stream
                                        
Last-Modified: Thu, 17 May 2018 13:13:29 GMT
Accept-Ranges: bytes
Etag: "41b9dcd8e0edd31:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 26 May 2019 15:39:23 GMT
Content-Length: 631820


--- Additional Info ---
Magic:  PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Size:   631820
Md5:    7f10e4c3f7443bf23d40b7c52906df2a
Sha1:   f4a430857aa2fe83c0837fa901f16fd5571ed041
Sha256: f247ec0deb7b9c18f3d496b55ab9f38926dae9b591f93a4a1c3977a215e60b98

Alerts:
  Blacklists:
    - fortinet: Malware
  IDS:
    - ET POLICY PE EXE or DLL Windows file download HTTP
    - ET TROJAN JS/Nemucod.M.gen downloading EXE payload
    - ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
    - ET TROJAN JS/Nemucod requesting EXE payload 2016-02-01