Report Overview

  1. Submitted URL

    36.96.38.235/download/kedadecoder.zip

  2. IP

    36.96.38.235

    ASN

    #4134 Chinanet

  3. Submitted

    2024-05-08 04:46:18

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
36.96.38.235unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium36.96.38.235Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    36.96.38.235/download/kedadecoder.zip

  2. IP

    36.96.38.235

  3. ASN

    #4134 Chinanet

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    2.9 MB (2918053 bytes)

  2. Hash

    ddee1a2ed1977306485e92b088f39b3e

    2f913dd7c1ebe7d4ebc6ede8cc0c41b5ee58f544

  1. Archive (3)

  2. FilenameMd5File type
    Kedacom��������װ˵��.txt
    aca54a27a767de5efe64fbb6b5489cea
    ISO-8859 text, with CRLF line terminators
    kedadecodersetup.exe
    1a0c1cd73a8dc9e56dcc26eea49b729d
    PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections
    wm814127.exe
    d81fc765e89e3a49eaee71206bb65004
    PE32 executable (GUI) Intel 80386, for MS Windows, MS CAB-Installer self-extracting archive, 3 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    detect_Redline_Stealer
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
36.96.38.235/download/kedadecoder.zip
36.96.38.235200 OK2.9 MB