Report Overview

  1. Submitted URL

    192.140.225.33/phpMyAdmin/Ganja54.exe

  2. IP

    192.140.225.33

    ASN

    #56233 PT Asia Teknologi Solusi

  3. Submitted

    2024-04-25 11:49:01

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    5

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
192.140.225.33unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
mediumClient IP 192.140.225.33
low 192.140.225.33Client IP
high 192.140.225.33Client IP
medium 192.140.225.33Client IP
low 192.140.225.33Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium192.140.225.33/phpMyAdmin/Ganja54.exeDetects suspicious file path pointing to the root of a folder easily accessible via environment variables

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium192.140.225.33Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    192.140.225.33/phpMyAdmin/Ganja54.exe

  2. IP

    192.140.225.33

  3. ASN

    #56233 PT Asia Teknologi Solusi

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections

    Size

    31 kB (30720 bytes)

  2. Hash

    13b6ed8c79f9a878e6d77ec51d4a71a3

    03c6d760d20eed30157b5a68cc15229101618702

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious file path pointing to the root of a folder easily accessible via environment variables
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
192.140.225.33/phpMyAdmin/Ganja54.exe
192.140.225.33200 OK31 kB