Report Overview

  1. Submitted URL

    www.nextenders.com/Cryptoserviceupdate/update.zip

  2. IP

    124.153.94.162

    ASN

    #17439 Netmagic Datacenter Mumbai

  3. Submitted

    2024-04-26 12:31:13

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.nextenders.comunknown2002-08-272014-06-202023-01-08

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.nextenders.com/Cryptoserviceupdate/update.zip

  2. IP

    124.153.94.162

  3. ASN

    #17439 Netmagic Datacenter Mumbai

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    6.6 MB (6620175 bytes)

  2. Hash

    edca7cf8102c65dccdc8598dda536b53

    5ba59c1d7098a82f0b8ba6d19771a5d3f29b2af1

  1. Archive (36)

  2. FilenameMd5File type
    AddHostEntry.bat
    f4acd14ae2bcb2c5b0d39006316690f9
    DOS batch file, ASCII text, with CRLF line terminators
    cmd.exe
    6d778e0f95447e6546553eeea709d03c
    PE32 executable (console) Intel 80386, for MS Windows, 3 sections
    copyToStartup.bat
    5ea0141dc28425f823dab47d14685023
    ASCII text, with CRLF line terminators
    CreateShortcut.vbs
    d20b183f71f4780cc34b8adf882d0de2
    ASCII text, with CRLF line terminators
    deleteFromStartup.bat
    bf7e29ad6784ac12b62be88241b2464f
    DOS batch file, ASCII text, with CRLF line terminators
    EtNxtCryptoService.bat
    e5790dc3b21afb6333d770ac70f22742
    ASCII text, with no line terminators
    EtNxtCryptoService.exe
    7026888fe7d34c4a48e4478c01661494
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    EtNxtCryptoService.ini
    cfc58bf928272e083e904c40578bc4cc
    ASCII text, with CRLF line terminators
    EtNxtCryptoService.lnk
    068b286b860241f7eb8692310b15167b
    MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Sat Nov 28 05:44:14 2015, mtime=Sat Dec 12 08:17:23 2015, atime=Sat Nov 28 05:44:14 2015, length=33, window=hide
    EtNxtCryptoSocketServer.ico
    04c3885eb89f5213867daa52ccc15498
    MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
    EtNxtCryptoSocketServer.jar
    4d4bbed427e40023e5b60ee24c6e0a9d
    Java archive data (JAR)
    Execute.bat
    b08fdde11ae4a76f5483baa242f68501
    ASCII text, with CRLF line terminators
    ExecuteInBackground.vbs
    60768f22d2353ac6362d758bc52ca9b2
    ASCII text, with CRLF line terminators
    bcprov-ext-jdk15on-150.jar
    f9e058e0b0100be84953fa795fb95847
    Java archive data (JAR)
    bcprov-jdk15on-150.jar
    e8c080e945a79a82cd6a2533c375e412
    Java archive data (JAR)
    jacob.jar
    2581fd9a245179642d716f99a0a235e7
    Zip archive data, at least v2.0 to extract, compression method=deflate
    json-simple-1.1.1.jar
    3b7816cfc3acc2decd742063df588514
    Java archive data (JAR)
    libusb4java-1.2.0-windows-x86.jar
    34aad31ece15669a234f6baa957aa68b
    Java archive data (JAR)
    log4j-1.2.17.jar
    4d729f0dfc2aef2289afe47f28e6482b
    Java archive data (JAR)
    NXTCryptographyUtlity.jar
    c362ac2ef2144feab6760cd2e301dc38
    Zip archive data, at least v2.0 to extract, compression method=deflate
    usb4java-1.2.0.jar
    e97fb10c92d6b4cd3fb3f46b91bcc999
    Zip archive data, at least v1.0 to extract, compression method=store
    ReadMe.rtf
    e85abba0b92bcd6588767ea9409ffff1
    Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
    EtNxtCertificateKeys.dll
    42e1763a15678b04561519cf7081cd02
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtCertificateLogin.dll
    31c5bd59b0ea9c79a918079243e6d64b
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtDecrypt.dll
    3a2b4344c319128b46364504b348cbe5
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtEncrypt.dll
    87c922d9f9c124e8d9cb504bee9d7452
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtFileDecryptAndVerifySign.dll
    d8cc73079a838caa906b298038d63bc3
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtFileEncryptAndSign.dll
    4b36fa89d9cee0e9184ec3262d56770e
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtHash.dll
    7df8a0ca576f81834f8acfc81c1bed16
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtKeyGenerator.dll
    e760b7b3bdf02d056f07ac9f72b9cb00
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtLocalKeys.dll
    1eb85b9f434d8a93f608d7200eb44750
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtSignHash.dll
    ef7de902bbc7306c36670a304f9a7060
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtUtils.dll
    96589dc39f44d80f575bbb3375d70b65
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    EtNxtVerifySignHash.dll
    e602c4aafeb9b393dc16b8634240cc41
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    NxtCryptoError.txt
    4afe723bf96f3e24f741a2b66f3b0f9b
    CSV text
    NxtCryptoTrace.txt
    78cb4731a76d471be41026cdc147b290
    CSV text

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies scripting artefacts in shortcut (LNK) files.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.nextenders.com/Cryptoserviceupdate/update.zip
124.153.94.162200 OK6.6 MB