Report Overview
Submitted URL
sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.com/store/39857/listings/deliverables/LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip?response-content-disposition=attachment;%20filename%20="LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip"&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=968c8ef1669cf97adff907d50b2038b0/20240423/auto/s3/aws4_request&X-Amz-Date=20240423T165947Z&X-Amz-SignedHeaders=host&X-Amz-Expires=3600&X-Amz-Signature=2e938e2eb880e04dd638dafe9902427baf578b0a25d878b9b04fd1214af87744
IP
104.18.8.90
ASN
#13335 CLOUDFLARENET
Submitted
2024-04-23 17:10:06
Access
public
Website Title
about:privatebrowsing
Final URL
about:privatebrowsing
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.com | unknown | 2018-07-31 | 2023-01-03 | 2024-04-17 | 1.0 kB | 549 kB | 104.18.8.90 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
Files detected
URL
sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.com/store/39857/listings/deliverables/LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip?response-content-disposition=attachment;%20filename%20=%22LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip%22&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=968c8ef1669cf97adff907d50b2038b0/20240423/auto/s3/aws4_request&X-Amz-Date=20240423T165947Z&X-Amz-SignedHeaders=host&X-Amz-Expires=3600&X-Amz-Signature=2e938e2eb880e04dd638dafe9902427baf578b0a25d878b9b04fd1214af87744
IP
104.18.8.90
ASN
#13335 CLOUDFLARENET
File type
Zip archive data, at least v2.0 to extract, compression method=store
Size
548 kB (548474 bytes)
Hash
11e7644c95387c1860ce7e936c749f74
a483dfec45aa156c31e5600b88ef043f23fbaaf1
Archive (6)
Filename | Md5 | File type | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
dControl.ini | 05450ff06366ae22654b63a6e27d1624 | Unicode text, UTF-16, little-endian text, with CRLF line terminators | |||||||||
defcon.exe | 58008524a6473bdf86c1040a9a9e39c3
| PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections | |||||||||
Defender_Settings.vbs | b0bf0a477bcca312021177572311e666 | ASCII text, with CRLF line terminators | |||||||||
ezdebug.png | 654dfa5c392f08728a7acc79587ecdd1 | PNG image data, 1278 x 762, 8-bit colormap, non-interlaced | |||||||||
loader-upd.exe | 573bd20fc8382d92a7ae9eae51e738e3
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | |||||||||
READ ME (ro-exec).txt | 6c01f5ff64c164e309b428ee19262f98 | ASCII text, with CRLF line terminators |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects malware by known bad imphash or rich_pe_header_hash |
Public InfoSec YARA rules | malware | Identifies Defender Control, used by attackers to disable Windows Defender. |
YARAhub by abuse.ch | malware | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
sell-production.7bca50a0c064d476bbd1b6bdb43135ad.r2.cloudflarestorage.com/store/39857/listings/deliverables/LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip?response-content-disposition=attachment;%20filename%20=%22LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip%22&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=968c8ef1669cf97adff907d50b2038b0/20240423/auto/s3/aws4_request&X-Amz-Date=20240423T165947Z&X-Amz-SignedHeaders=host&X-Amz-Expires=3600&X-Amz-Signature=2e938e2eb880e04dd638dafe9902427baf578b0a25d878b9b04fd1214af87744 | 104.18.8.90 | 200 OK | 548 kB | |||||||
Detections
HTTP Headers
| ||||||||||