Report Overview

  1. Submitted URL

    www.wwwalker.net/bathtub/bathtub_install.zip

  2. IP

    66.96.146.129

    ASN

    #29873 BIZLAND-SD

  3. Submitted

    2024-04-18 19:19:20

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.wwwalker.netunknown2001-07-272014-11-232023-12-11

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.wwwalker.net/bathtub/bathtub_install.zip

  2. IP

    66.96.146.129

  3. ASN

    #29873 BIZLAND-SD

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    14 MB (13533621 bytes)

  2. Hash

    0081dbbe542d5ffc15f57eee24f38871

    b9cb30a5e67aa070af0ecf58f5f460db9e8e4c22

  1. Archive (8)

  2. FilenameMd5File type
    bath.xla
    324acab5efa77bf58f7a27ff3301deb6
    Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: William W. Walker, Jr., Last Saved By: Anonymous, Name of Creating Application: Microsoft Excel, Last Printed: Thu Dec 12 20:11:02 2002, Create Time/Date: Mon Oct 21 01:05:50 2002, Last Saved Time/Date: Fri Aug 8 18:04:43 2008, Security: 0
    Bathtub_Excel_Issues.txt
    576fde15fd0e01c9c8c47adc1a0d8d5f
    ASCII text, with very long lines (471), with CRLF line terminators
    Comdlg32.ocx
    6785b09fc2d286f88944718acee94b52
    PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections
    MSCOMCTL.OCX
    766f501b61c22723536af696a74133d4
    PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections
    MSSTDFMT.DLL
    719e0f4d1114f700f564e9ae47f0e3ee
    PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections
    readme.txt
    579543c026b13df99b7a07202640e53a
    ASCII text, with CRLF line terminators
    Setup.ex_
    72da042a68f27ea18d1121880a2e84fd
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    TabCtl32.ocx
    dc925b6d77ba9ecb532e2f6750be943b
    PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.wwwalker.net/bathtub/bathtub_install.zip
66.96.146.129 14 MB