Report Overview

  1. Submitted URL

    gomocup.org/static/download-ai/PROLOG14.zip

  2. IP

    104.21.77.44

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-05-08 21:17:29

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
gomocup.orgunknown2013-04-152013-10-292024-04-08

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    gomocup.org/static/download-ai/PROLOG14.zip

  2. IP

    104.21.77.44

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    3.5 MB (3456324 bytes)

  2. Hash

    00b7d3959c9fe660031b44c9b22c3fc9

    db3471dbb5a59d073667ac135a8f1616e5e5b9a9

  1. Archive (3)

  2. FilenameMd5File type
    pbrain-prolog.conf
    c63d9d95986a08e116268145081fc498
    ASCII text
    pbrain-prolog.exx
    b1d72fd09bdaedb3ae725d2c7abd369f
    PE32 executable (console) Intel 80386, for MS Windows, 4 sections
    ppisk.bin
    b77516ed235e6baee1cbb70a9d7f0efe
    PE32 executable (console) Intel 80386, for MS Windows, 14 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
gomocup.org/static/download-ai/PROLOG14.zip
104.21.77.44200 OK3.5 MB