Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1202563684866457660/1215275220202557474/Lithium_V4.zip?ex=6628fb3f&is=6627a9bf&hm=0ff6ec9a6a50b88ebce0f0b863a30da43084a86423d676c247b2c8c215b0c9cb&

  2. IP

    162.159.135.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-23 21:29:48

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-04-22

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1202563684866457660/1215275220202557474/Lithium_V4.zip?ex=6628fb3f&is=6627a9bf&hm=0ff6ec9a6a50b88ebce0f0b863a30da43084a86423d676c247b2c8c215b0c9cb&

  2. IP

    162.159.135.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    314 kB (313909 bytes)

  2. Hash

    2f6e03149bac97fcff7fccc7070d9bfc

    77f50d445bd54a2d5cfd9dec76b80b74c869f043

  1. Archive (11)

  2. FilenameMd5File type
    channelamount.txt
    f899139df5e1059396431415e770c6dd
    ASCII text, with no line terminators
    channelnames.txt
    cd07cf342e8e7e211820183054c61e66
    ASCII text, with no line terminators
    roleamount.txt
    d645920e395fedad7bbbed0eca3fe2e0
    ASCII text, with no line terminators
    rolenames.txt
    0ee17c733cce2f6e9bfbd3d93da95b14
    ASCII text, with no line terminators
    webhookamount.txt
    c0c7c76d30bd3dcaefc96f40275bdc0a
    ASCII text, with no line terminators
    webhookmessage.txt
    a4147ed30ea3978581fd7fea5b931a47
    ASCII text, with no line terminators
    config maker.py
    4e48840a7f9581ac6c4add0c71199066
    Unicode text, UTF-8 text, with CRLF line terminators
    Lithium.exe
    1df60780b6b998fca971f2a535b08ce8
    PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    LithiumCore.dll
    80d79c50f5556276842a277c0796c052
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Newtonsoft.Json.dll
    081d9558bbb7adce142da153b2d5577a
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Veylib.dll
    3552d418ce6394cdd9fc0fb06b883013
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1202563684866457660/1215275220202557474/Lithium_V4.zip?ex=6628fb3f&is=6627a9bf&hm=0ff6ec9a6a50b88ebce0f0b863a30da43084a86423d676c247b2c8c215b0c9cb&
162.159.135.233200 OK314 kB