Report Overview

  1. Submitted URL

    files.vmos.cn/vmospro/plugin/android71xposed_plugin-64bit.zip

  2. IP

    119.36.90.148

    ASN

    #4837 CHINA UNICOM China169 Backbone

  3. Submitted

    2024-04-18 13:23:14

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
files.vmos.cnunknown2015-06-242019-10-092024-04-17

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    files.vmos.cn/vmospro/plugin/android71xposed_plugin-64bit.zip

  2. IP

    123.6.72.214

  3. ASN

    #4837 CHINA UNICOM China169 Backbone

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    10 MB (10186515 bytes)

  2. Hash

    7c17dd64dd483f913abefcba1f04e1b3

    a91ff7b3ac58def288f72d12982b5be45ce7a561

  1. Archive (21)

  2. FilenameMd5File type
    repo_cache.db
    3b2087045cb7c1d2deb054df41ecc323
    SQLite 3.x database, user version 4, last written using SQLite version 3009002, file counter 4, database pages 11, cookie 0x6, schema 4, largest root page 11, UTF-8, version-valid-for 4
    de.robv.android.xposed.installer_preferences.xml
    ab754f9a1fc14c2d3f2e88fca539c4c9
    XML 1.0 document, ASCII text
    download_cache.xml
    353322d15e4b6b8b12aec6727fa84762
    XML 1.0 document, ASCII text
    repo.xml
    eb040f0743669ee424a67d2fd18dc5ba
    XML 1.0 document, ASCII text
    XposedInstaller_3.1.5.apk
    315362d994986e6584203fca282f4472
    Android package (APK), with AndroidManifest.xml Zip archive data, at least v0.0 to extract, compression method=deflate
    app_process32
    25d5b0386790b242a88459b1d4e3d21c
    ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV)
    app_process64
    5686c326d48cf2ef6b3469104ee7aa18
    ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV)
    dex2oat
    199447c2da61cb6492bd60b2b1f121f8
    ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV)
    oatdump
    85a2393fbcc3630638a4b18dff98ee54
    ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV)
    patchoat
    6e8b6c517fb0e5c3b53c4ffbfdd1e17f
    ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV)
    XposedBridge.jar
    956145163b20889a7d895020f197e813
    Android package (APK), with AndroidManifest.xml Zip archive data, at least v2.0 to extract, compression method=deflate
    libart-compiler.so
    dbd0b05ef6fad2ceb18ee5fe0702a490
    ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV)
    libart.so
    3e73466c8ec2627bbfa2a51e7efa28e5
    ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV)
    libsigchain.so
    74badce0fa8ea983b7caea1540374027
    ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV)
    libxposed_art.so
    acc20081247461da88be446a5a8f2d40
    ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV)
    libart-compiler.so
    b1fd4f29eb6d0e9d657717a5cb19d6b0
    ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV)
    libart-disassembler.so
    46a29d91f6acc7099849b47d831a359c
    ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV)
    libart.so
    aa7e6e80dcca405a23d335a973e02ff1
    ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV)
    libsigchain.so
    393a59b185ec14a0c79a3eb185073c50
    ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV)
    libxposed_art.so
    fb7e23e3b5aa6ff09a2563c56b560aeb
    ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV)
    xposed.prop
    3c59f229469f69e5c30f3159282b0bae
    ASCII text

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
files.vmos.cn/vmospro/plugin/android71xposed_plugin-64bit.zip
123.6.72.214200 OK10 MB