Report Overview

  1. Submitted URL

    di.univ-blida.dz/xmlui/bitstream/handle/123456789/27003/2.621.381.5.019.pdf.exe?sequence=1&isAllowed=y

  2. IP

    41.111.243.104

    ASN

    #36947 Telecom Algeria

  3. Submitted

    2024-04-18 00:18:52

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
di.univ-blida.dzunknownunknown2022-10-042024-04-14

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumdi.univ-blida.dz/xmlui/bitstream/handle/123456789/27003/2.621.381.5.019.pdf.exe?sequence=1&isAllowed=yDetects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
mediumdi.univ-blida.dz/xmlui/bitstream/handle/123456789/27003/2.621.381.5.019.pdf.exe?sequence=1&isAllowed=yIdentifies compiled AutoIT script (as EXE).

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns
SeverityIndicatorAlert
mediumuniv-blida.dzSinkholed

Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    di.univ-blida.dz/xmlui/bitstream/handle/123456789/27003/2.621.381.5.019.pdf.exe?sequence=1&isAllowed=y

  2. IP

    41.111.243.104

  3. ASN

    #36947 Telecom Algeria

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Size

    841 kB (841216 bytes)

  2. Hash

    c849a7fb7abc85caf1cb7f79f11f9104

    a1bc144b64099018f840b4bcb97648a9da283ed8

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
di.univ-blida.dz/xmlui/bitstream/handle/123456789/27003/2.621.381.5.019.pdf.exe?sequence=1&isAllowed=y
41.111.243.104200 200841 kB