Report Overview

  1. Submitted URL

    www.airwindows.com/wp-content/uploads/2020/02/Neverland.zip

  2. IP

    192.185.46.61

    ASN

    #19871 NETWORK-SOLUTIONS-HOSTING

  3. Submitted

    2024-04-27 03:57:08

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.airwindows.comunknown1998-05-042014-04-042024-03-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.airwindows.com/wp-content/uploads/2020/02/Neverland.zip

  2. IP

    192.185.46.61

  3. ASN

    #19871 NETWORK-SOLUTIONS-HOSTING

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    374 kB (373495 bytes)

  2. Hash

    4ac5a834c22d724c58be8424bee8aa41

    730e46cb900b76c37a96468961e647499eaea382

  1. Archive (13)

  2. FilenameMd5File type
    Neverland.so
    249b2a3a377ac8b214fa7dc244c157ba
    ELF 64-bit LSB shared object, x86-64, version 1 (SYSV)
    Neverland
    c8c11e047b1fa82d9a957f871b86dcba
    Mach-O universal binary with 3 architectures: [ppc_7400: - Mach-O ppc_7400 bundle, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|BINDS_TO_WEAK>] [ - i386: - Mach-O i386 bundle, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|BINDS_TO_WEAK>] [ - x86_64: - Mach-O 64-bit x86_64 bundle, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|BINDS_TO_WEAK>]
    InfoPlist.strings
    3c62683186cf86fa2248dc13b2e202df
    Unicode text, UTF-16, big-endian text
    Neverland.rsrc
    e3a9d00406b6cf76aca68dd6c3ea0603
    Apple HFS/HFS+ resource fork, map offset 0x1a0, map length 0x7c, data length 0xa0, fileRef 0x900, list offset 0x1c, name offset 0x66, 3 types, 0x53545220 'STR ' * 2 resource offset 0x1a
    Info.plist
    608f8f4b7beefc903b381897a527dd3f
    XML 1.0 document, ASCII text
    PkgInfo
    5e0f4e8fadc039a4a370d978294df118
    ASCII text, with no line terminators
    Neverland64.dll
    6697aaba4ba0d1cdd9834a69c5c298a8
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
    Neverland
    1e800476253e377c005d15081a140ace
    Mach-O universal binary with 3 architectures: [ppc_7400: - Mach-O ppc_7400 bundle, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK>] [ - i386: - Mach-O i386 bundle, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK>] [ - x86_64: - Mach-O 64-bit x86_64 bundle, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK>]
    PkgInfo
    189f15f054a11445de17ea02b1dc4213
    ASCII text, with no line terminators
    Info.plist
    c7e11bb09b6afb6b75ed6aead0367d72
    XML 1.0 document, ASCII text
    PkgInfo
    189f15f054a11445de17ea02b1dc4213
    ASCII text, with no line terminators
    ._PkgInfo
    8d7588f4a0687b07b874930c73399917
    AppleDouble encoded Macintosh file
    Neverland32.dll
    11b65f237d25d317d0c1aba366ab0e57
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.airwindows.com/wp-content/uploads/2020/02/Neverland.zip
192.185.46.61200 OK374 kB