Report Overview

  1. Submitted URL

    www.greatis.com/dbs.zip

  2. IP

    144.217.89.149

    ASN

    #16276 OVH SAS

  3. Submitted

    2024-05-04 01:48:21

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.greatis.comunknown2000-02-172012-05-242023-09-14

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.greatis.com/dbs.zip

  2. IP

    144.217.89.149

  3. ASN

    #16276 OVH SAS

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    2.5 MB (2514378 bytes)

  2. Hash

    fe76c9a4586553717884fbfe1b525bf7

    8a0e4b983d8df06cdea09a0494b3c1299da4461c

  1. Archive (2)

  2. FilenameMd5File type
    dbs.db
    9132a7c2531cb9a74fb9b07f1c261181
    SQLite 3.x database, last written using SQLite version 3019003, page size 1024, file counter 22236, database pages 5332, cookie 0x49, schema 4, UTF-8, version-valid-for 21920
    dbswww.ini
    aa020e139a7b1fd8a1f000c04821f5ab
    Generic INItialization configuration [Chat]

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious PowerShell code that downloads from web sites
    Public InfoSec YARA rulesmalware
    Identifies AutoIT script.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.greatis.com/dbs.zip
144.217.89.149200 OK2.5 MB