Report Overview

  1. Submitted URL

    kawamoto.no-ip.org/henteko/myapp/ditherig22.zip

  2. IP

    133.167.77.223

    ASN

    #9371 SAKURA Internet Inc.

  3. Submitted

    2024-04-20 11:50:01

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    13

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
kawamoto.no-ip.orgunknown2001-11-222014-11-072024-03-22
aus5.mozilla.org25481998-01-242015-10-272024-04-19
normandy.cdn.mozilla.net35621998-01-312017-01-302024-04-19
classify-client.services.mozilla.com38241994-10-182019-01-092024-04-19

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    kawamoto.no-ip.org/henteko/myapp/ditherig22.zip

  2. IP

    133.167.77.223

  3. ASN

    #9371 SAKURA Internet Inc.

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    262 kB (262470 bytes)

  2. Hash

    ac7505b34407d36e2213b8464d00e22a

    a5dcce9726893a2d97111343c684f76b85da6d17

  1. Archive (15)

  2. FilenameMd5File type
    database.csv
    e88859afaacc6d42d8af208999bacb59
    ASCII text, with CRLF line terminators
    ditherig.exe
    3bf1aba871d3de00b34a43460a92896d
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    inpoutx64.dll
    ac0c3ae82ec0764c605fa59e7bf05614
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    inpoutx64.sys
    9321a61a25c7961d9f36852ecaa86f55
    PE32+ executable (native) x86-64, for MS Windows, 6 sections
    WinRing0x64.dll
    b197b687ebdba80f965335483d178efc
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    WinRing0x64.sys
    0c0195c48b6b8582fa6f6373032118da
    PE32+ executable (native) x86-64, for MS Windows, 6 sections
    InpOut32.txt
    a5f1bbfe59d3f3acf9f753bc525f67e0
    ASCII text, with CRLF line terminators
    readme.txt
    043b846a4ec3a1071d6cb3f699cb62b5
    Non-ISO extended-ASCII text, with CRLF, NEL line terminators
    WinRing0.txt
    1fe36a3efeb9f0f5ebb66c8b06428aa0
    Non-ISO extended-ASCII text, with CRLF line terminators
    database.csv
    e88859afaacc6d42d8af208999bacb59
    ASCII text, with CRLF line terminators
    ditherig.exe
    1ed910ae142776322bd97aaf3717a648
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    inpout32.dll
    c1ccde650bf91a3b1d07dc5494d4276f
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    inpout32.sys
    f08ebaf4493e99f4f095a4f7696287d4
    PE32 executable (native) Intel 80386, for MS Windows, 6 sections
    WinRing0.dll
    6fc52a8c0cccd5f9b1cdb3de99cb3d3c
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    WinRing0.sys
    845af1ba23c8d5e64def61bcc441604c
    PE32 executable (native) Intel 80386, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - inpoutx64.sys
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - inpoutx64.sys
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - WinRing0x64.sys
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - inpoutx64.sys
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - WinRing0x64.sys
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (4)

URLIPResponseSize
kawamoto.no-ip.org/henteko/myapp/ditherig22.zip
133.167.77.223200 OK262 kB
aus5.mozilla.org/update/3/GMP/111.0a1/20240129201730/Linux_x86_64-gcc3/null/default/Linux%205.15.0-102-generic%20(GTK%203.24.37%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201 444 B
normandy.cdn.mozilla.net/api/v1/
35.201.103.21 598 B
classify-client.services.mozilla.com/api/v1/classify_client/
34.98.75.36 64 B