Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1228727558678380634/1230260091572453426/Real-Shoyzn_Hard-KONT.zip?ex=6632abfe&is=662036fe&hm=61ee1dc28fa5441d94bb292a58345aa0b9d2910cd9f26084804472e8acaaddf4&

  2. IP

    162.159.134.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-17 22:30:24

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-04-17

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1228727558678380634/1230260091572453426/Real-Shoyzn_Hard-KONT.zip?ex=6632abfe&is=662036fe&hm=61ee1dc28fa5441d94bb292a58345aa0b9d2910cd9f26084804472e8acaaddf4&

  2. IP

    162.159.134.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    13 MB (12978885 bytes)

  2. Hash

    43c24218491a3f46d24a3b0713f710b3

    89723e90a97e7b327244e4c50eeaa8213ab79e10

  1. Archive (7)

  2. FilenameMd5File type
    cmd text.txt
    00593da2bc911f1930905265d9fdf874
    ASCII text, with no line terminators
    appdata kodu.txt
    fb24e3b49622016467f8bfd1ca441361
    ASCII text, with no line terminators
    Everything.lnk
    8f973a747035d0560d479a7ae146643f
    MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Dec 10 16:33:32 2023, mtime=Wed Mar 6 11:22:44 2024, atime=Fri May 26 00:40:00 2023, length=2265096, window=hide
    journal-tool (2).exe
    445fbbeb5d7ab4cf029200c856b20d05
    PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 19 sections
    JournalTrace.exe
    779386ff00b119b91f1ef5e36168edae
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    shellbag_analyzer_cleaner.exe
    463058236a0d84f8f8982d946eed0e07
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
    AnyDesk.exe
    863fa58aa1fe8a88626625b191d4722e
    PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies executable artefacts in shortcut (LNK) files.
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1228727558678380634/1230260091572453426/Real-Shoyzn_Hard-KONT.zip?ex=6632abfe&is=662036fe&hm=61ee1dc28fa5441d94bb292a58345aa0b9d2910cd9f26084804472e8acaaddf4&
162.159.134.233200 OK13 MB