Report Overview

  1. Submitted URL

    snsdsh.tistory.com/attachment/cfile23.uf@1969CA4E4DB143F1108792.zip

  2. IP

    27.0.236.143

    ASN

    #38099 Kakao Corp

  3. Submitted

    2024-05-11 01:03:43

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
snsdsh.tistory.comunknownunknownNo dataNo data
t1.daumcdn.net20239unknownNo dataNo data
status.thawte.com5123unknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    t1.daumcdn.net/cfile/tistory/1969CA4E4DB143F110?download

  2. IP

    23.36.76.241

  3. ASN

    #20940 Akamai International B.V.

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    215 kB (215216 bytes)

  2. Hash

    49153a059ee08f4ccad625b8bfc7df98

    eadc1bfcb4089e4b0d1d7c26df186a0e35607ecb

  1. Archive (18)

  2. FilenameMd5File type
    !Readme - Oblivion.rtf
    89df49f7b410719d6277a276aa9841d7
    Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
    Oblivion.dll
    d119eaf3a265e712ee861ccd6e717745
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed, 3 sections
    Oblivion.ini
    cf9a6d0eeb0f266a5bd7785fdbace94f
    ASCII text, with CRLF line terminators
    zLoader.exe
    ea0a991d31ff4c264f175e53cd983ab8
    PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed, 2 sections
    zLoader.snp
    4048924ad33ed1392816a5643a6d7c8b
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    sclog_8.13.2009.txt
    7b91a14f18775b39956760a2296ce114
    data
    sclog_8.17.2009.txt
    b8ff1ebf4d9c4d22e1d07548063cc64e
    data
    sclog_8.18.2009.txt
    ac2cbdb09ae2d11733371fb1760c827a
    ISO-8859 text, with CRLF line terminators
    sclog_8.19.2009.txt
    194ce9f34caa9b369e816519877ef2a6
    ISO-8859 text, with CRLF line terminators
    sclog_8.20.2009.txt
    90610b72cb001040ea6c1923ed966110
    data
    sclog_8.22.2009.txt
    a3fbe77d0da8011b30ae7a4ae322165d
    data
    sclog_8.23.2009.txt
    289d64cd0237911b81bc0f7f4166c169
    data
    sclog_8.24.2009.txt
    c1faaa7f525f46cd479f8342f765478f
    data
    sclog_8.25.2009.txt
    2be7425039d48189d9bced36218d5d74
    data
    sclog_8.26.2009.txt
    0de11fb03268c436e3fa0480f383ceea
    data
    sclog_8.27.2009.txt
    13e7ba1be9fff554e51de540c18650cf
    data
    sclog_8.28.2009.txt
    35a031cd0b8f6360806d05ae31604ce5
    data
    sclog_8.29.2009.txt
    7dfd3945465034a73701f31ce93d0d0e
    ISO-8859 text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (4)

URLIPResponseSize
status.thawte.com/
192.229.221.95 471 B
snsdsh.tistory.com/attachment/cfile23.uf@1969CA4E4DB143F1108792.zip
27.0.236.143302 Found0 B
snsdsh.tistory.com/
27.0.236.143 7.5 kB
t1.daumcdn.net/cfile/tistory/1969CA4E4DB143F110?download
23.36.76.241200 OK215 kB