Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1230372049328013403/1230374568175079424/Luna-Grabber-main_1.zip?ex=6633169c&is=6620a19c&hm=425cca476005ed6a2037e8bdaad4b4147856ae54b468ca42da5a7d0881d82d29&

  2. IP

    162.159.129.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-18 04:33:36

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-04-17
aus5.mozilla.org25481998-01-242015-10-272024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1230372049328013403/1230374568175079424/Luna-Grabber-main_1.zip?ex=6633169c&is=6620a19c&hm=425cca476005ed6a2037e8bdaad4b4147856ae54b468ca42da5a7d0881d82d29&

  2. IP

    162.159.129.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    53 kB (53340 bytes)

  2. Hash

    08e829ba4f8d6fb048821404b34d2d5e

    667390107bf4b4f077945e16aa8e93628d76838d

  1. Archive (16)

  2. FilenameMd5File type
    bug_report.md
    19dcdd1cd8633266aa38efdac488f7c3
    ASCII text
    feature_request.md
    cc5c8c854a08d96e7dc387ae16b00b0b
    ASCII text
    .gitignore
    cc578a6e40916306a71af789f6fc8616
    ASCII text
    README.md
    21a41e7ffc16e67ca2eb82f6458c0551
    Unicode text, UTF-8 text
    builder.pyw
    933734f9bbbc35f704856a7d4f38d267
    Python script, ASCII text executable, with very long lines (2908)
    clipboard.png
    5928442bf2b7571ff23692278c7d3419
    PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
    help.png
    7a13e9fb75eb16d860d32808eb64ff36
    PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
    home.png
    0f46864fc6bef1e7fa7d23e9c3644d9c
    PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
    luna.ico
    d732d47fbcdd1d247a7460e87063f05b
    MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
    luna.png
    81a4f936f4453da3d8613f26e49d2d64
    PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
    luna.py
    5558dc3ab4335b84f927379def297cc7
    Python script, Unicode text, UTF-8 text executable, with very long lines (968), with CRLF line terminators
    requirements.txt
    997a3d961d4d27348c3433de154e5192
    ASCII text, with CRLF line terminators
    setup.bat
    7e94a0c9f948f80fa7bd043b0641a35f
    DOS batch file, ASCII text, with CRLF line terminators
    obfuscation.py
    ee17063bd2e29ac3d56641df002a132e
    Python script, ASCII text executable, with very long lines (351), with CRLF line terminators
    update.py
    9b7414af3a32d4a12b8cea51a069bf30
    Python script, Unicode text, UTF-8 text executable
    upx.py
    6cd4cb1bb1167132fab0354cf0ebe35e
    Python script, ASCII text executable

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
cdn.discordapp.com/attachments/1230372049328013403/1230374568175079424/Luna-Grabber-main_1.zip?ex=6633169c&is=6620a19c&hm=425cca476005ed6a2037e8bdaad4b4147856ae54b468ca42da5a7d0881d82d29&
162.159.129.233200 OK53 kB
aus5.mozilla.org/update/3/GMP/111.0a1/20240129201730/Linux_x86_64-gcc3/null/default/Linux%205.15.0-101-generic%20(GTK%203.24.37%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201 444 B