Report Overview

  1. Submitted URL

    ahteam.org/files/tools/yoda_process_patcher.zip

  2. IP

    178.46.165.29

    ASN

    #12389 Rostelecom

  3. Submitted

    2024-04-19 19:59:52

    Access

    public

  4. Website Title

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
ahteam.orgunknown2003-09-192012-07-062024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    ahteam.org/files/tools/yoda_process_patcher.zip

  2. IP

    178.46.165.29

  3. ASN

    #12389 Rostelecom

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    196 kB (195768 bytes)

  2. Hash

    024283faafcd92fc507f5eb039ad45f6

    6f61c58ed9c5ed04657719da0992210a770e1ea5

  1. Archive (4)

  2. FilenameMd5File type
    readme.txt
    f251dd6c1e2ea8f98197490d80c30582
    ASCII text, with CRLF line terminators
    f2f.nfo
    f0ee0a38c32e81a007e85230eb0247da
    ISO-8859 text, with CRLF line terminators
    yPP.exe
    85b395fe9ecf76ad04542f21f2094742
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    ypp.ini
    1c44b2d337a2125c42ad9ce3e5e13472
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Chinese Hacktool Set - file IISPutScannesr.exe
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
ahteam.org/files/tools/yoda_process_patcher.zip
178.46.165.29 196 kB