Report Overview
Submitted URL
s3proesc.s3.amazonaws.com/anexos/1668093182.exe
IP
16.12.0.41
ASN
#16509 AMAZON-02
Submitted
2024-05-07 12:40:01
Access
public
Website Title
about:privatebrowsing
Final URL
about:privatebrowsing
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
13
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
s3proesc.s3.amazonaws.com | unknown | 2005-08-18 | 2022-02-06 | 2022-02-06 | 501 B | 74 kB | 16.12.1.65 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2024-05-07 | medium | s3proesc.s3.amazonaws.com/anexos/1668093182.exe | Cobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x |
2024-05-07 | medium | s3proesc.s3.amazonaws.com/anexos/1668093182.exe | Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal) |
2024-05-07 | medium | s3proesc.s3.amazonaws.com/anexos/1668093182.exe | meth_peb_parsing |
2024-05-07 | medium | s3proesc.s3.amazonaws.com/anexos/1668093182.exe | Windows.Trojan.Metasploit |
2024-05-07 | medium | s3proesc.s3.amazonaws.com/anexos/1668093182.exe | Cobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x |
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2024-05-07 | medium | s3proesc.s3.amazonaws.com | Sinkholed |
ThreatFox
No alerts detected
Files detected
URL
s3proesc.s3.amazonaws.com/anexos/1668093182.exe
IP
16.12.1.65
ASN
#16509 AMAZON-02
File type
PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
Size
74 kB (73802 bytes)
Hash
9fbc495f7b8396fd10b994d966f88796
bec733be9817a91cdd6292160e4d06d640fc0aa7
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Cobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x |
Public Nextron YARA rules | malware | Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal) |
YARAhub by abuse.ch | malware | meth_peb_parsing |
Elastic Security YARA Rules | malware | Windows.Trojan.Metasploit |
Google GCTI YARA rules | malware | Cobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
s3proesc.s3.amazonaws.com/anexos/1668093182.exe | 16.12.1.65 | 200 OK | 74 kB | |||||||||||||||||||||||||
Detections
HTTP Headers
| ||||||||||||||||||||||||||||