Report Overview

  1. Submitted URL

    foxlap.com/tutorials/wp-content/uploads/2024/01/foxlap-DIY-v1.1-1.zip

  2. IP

    95.216.102.230

    ASN

    #24940 Hetzner Online GmbH

  3. Submitted

    2024-05-05 07:08:32

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
foxlap.comunknown2023-03-132019-07-042021-02-01

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    foxlap.com/tutorials/wp-content/uploads/2024/01/foxlap-DIY-v1.1-1.zip

  2. IP

    95.216.102.230

  3. ASN

    #24940 Hetzner Online GmbH

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    7.3 MB (7349829 bytes)

  2. Hash

    094dfb4953f422768a468bd716092036

    eec199c0f7fa4a8f81d709f7ff6d02db43906e6b

  1. Archive (8)

  2. FilenameMd5File type
    boot_app0.bin
    e6327541e2dc394ca2c3b3280ac0f39f
    data
    esptool.exe
    1efd03ea3cba3849df48a6143b810f22
    PE32+ executable (console) x86-64, for MS Windows, 7 sections
    flash_firmware.bat
    ec111ba99d28ccb3b70c6f0c364fa1cf
    DOS batch file, ASCII text, with CRLF line terminators
    foxlap.DIY.bootloader.bin
    33cdbb00ef06d04b5973d759f6473e06
    DOS executable (COM), start instruction 0xe903022f f0050840
    foxlap.DIY.partitions.bin
    2ddc2d5f85b2c5288013adbe45d9cb7b
    data
    license.txt
    45fec0acfb312264d1869a97dd052e39
    ASCII text, with CRLF line terminators
    version.txt
    a2daed94462b4c994ad1c312643ebcb2
    ASCII text, with CRLF line terminators
    foxlap.DIY.bin
    c27a6aab172d22249a3f14a373ef7efc
    DOS executable (COM), start instruction 0xe906022f 94300840

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies executable converted using PyInstaller.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
foxlap.com/tutorials/wp-content/uploads/2024/01/foxlap-DIY-v1.1-1.zip
95.216.102.230 7.3 MB