Report Overview

  1. Submitted URL

    v2.amt4.jp/releases/clients/amt_setup.exe?v=2.2.6

  2. IP

    172.67.185.162

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-05-05 01:25:58

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
aus5.mozilla.org25481998-01-242015-10-272024-05-03
v2.amt4.jpunknown2018-10-302024-01-092024-04-12

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumv2.amt4.jp/releases/clients/amt_setup.exe?v=2.2.6files - file ~tmp01925d3f.exe

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    v2.amt4.jp/releases/clients/amt_setup.exe?v=2.2.6

  2. IP

    104.21.36.50

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections

    Size

    701 kB (701296 bytes)

  2. Hash

    fb668267b553cb8793b201136a437e2e

    fa9ca077848afe5c74787326018a61c194ad6755

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
aus5.mozilla.org/update/3/GMP/111.0a1/20240129201730/Linux_x86_64-gcc3/null/default/Linux%205.15.0-102-generic%20(GTK%203.24.37%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201 444 B
v2.amt4.jp/releases/clients/amt_setup.exe?v=2.2.6
104.21.36.50200 OK701 kB