Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1140299281308340345/1188470769190183032/boostfps300_1.zip?ex=66382fe8&is=6636de68&hm=0dec0c864a561771ee0d0d47a4cfec0f9183d53a24020fd9277778102bac80ac&

  2. IP

    162.159.134.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-05-05 06:26:14

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-05-04

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1140299281308340345/1188470769190183032/boostfps300_1.zip?ex=66382fe8&is=6636de68&hm=0dec0c864a561771ee0d0d47a4cfec0f9183d53a24020fd9277778102bac80ac&

  2. IP

    162.159.130.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    5.7 kB (5687 bytes)

  2. Hash

    97181a0e9bd27ab873e87e26da3b4c28

    2c5883dac6715653d4ea2cc05e628cd1366c953f

  1. Archive (4)

  2. FilenameMd5File type
    newbootfps 300.bat
    5ad5d15caaa33aebae8908338ef2ab25
    ASCII text
    BOOTFPS.reg
    b1fc72d29cf44ba3801c2d130b169d52
    ASCII text, with CRLF line terminators
    gta5_settings (1).xml
    bbc89485ee364001ef31198bed4891ef
    XML 1.0 document, ASCII text, with CRLF line terminators
    หมัดจมสุดใน fivem.reg
    e3f4d1388dadd05cb552c0bd3906bc9a
    Windows Registry text (Win2K or above)

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects Windows eventlog cleaner used in Operation Wilted Tulip - file clrlg.bat
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1140299281308340345/1188470769190183032/boostfps300_1.zip?ex=66382fe8&is=6636de68&hm=0dec0c864a561771ee0d0d47a4cfec0f9183d53a24020fd9277778102bac80ac&
162.159.130.233200 OK5.7 kB