Report Overview

  1. Submitted URL

    erwin-us.s3.amazonaws.com/Support/ADS/v13.2/erwin_DQ_Installation_Scripts.zip

  2. IP

    3.5.29.48

    ASN

    #14618 AMAZON-AES

  3. Submitted

    2024-05-08 10:44:56

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
erwin-us.s3.amazonaws.comunknown2005-08-182022-07-052024-01-15

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    erwin-us.s3.amazonaws.com/Support/ADS/v13.2/erwin_DQ_Installation_Scripts.zip

  2. IP

    52.217.114.105

  3. ASN

    #16509 AMAZON-02

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    22 kB (21639 bytes)

  2. Hash

    06a6c629ddd186b7766bbface117d5ac

    dd200397ffbaf1d7b748c10587c2c60b319d9931

  1. Archive (8)

  2. FilenameMd5File type
    DQLabs_Linux_1_10_0.sh
    300097930279a57e515982eed458d530
    Bourne-Again shell script, ASCII text executable, with very long lines (473), with CRLF line terminators
    DQLabs_Linux_Upgrade_to_V1_10_0.sh
    41b2081627260662f8157a5618d93203
    Bourne-Again shell script, ASCII text executable, with CRLF line terminators
    DQLabs_URLs_Validating_Script.ps1
    3370797cd7e01ab46d99cf18cebe14f5
    ASCII text, with CRLF line terminators
    DQLabs_Windows_Prerequisites_install_V1_10_0.ps1
    38d75316266b7b50b772efad794eaf0c
    Unicode text, UTF-8 (with BOM) text, with very long lines (668), with CRLF line terminators
    DQLabs_Windows_Server_Deployment_V1_10_0.ps1
    0233ea9f1e46d5fd3f0b4ee56632f3ce
    Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    DQLabs_Windows_Backup_V1_10_0.ps1
    7084acf48f487b67d99ff77060375fcd
    Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    DQLabs_Windows_Client_Code_Upgrade_V1_10_0.ps1
    1813a2129756872de77fcd85d072e624
    Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    DQLabs_Windows_Server_Deployment_V1_10_0.ps1
    e58fc47139d7853dc74813f80a5778ec
    Unicode text, UTF-8 (with BOM) text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious PowerShell code that downloads from web sites

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
erwin-us.s3.amazonaws.com/Support/ADS/v13.2/erwin_DQ_Installation_Scripts.zip
52.217.114.105200 OK22 kB