Report Overview

  1. Submitted URL

    loader.oxy.st/get/7b82a5a4bac77e1841dc4bd261cfc4a4/

  2. IP

    104.21.234.183

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-03-29 04:37:36

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    18

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
loader.oxy.stunknown2019-11-032022-10-192024-03-26
s1.oxy.stunknown2019-11-032022-06-042024-03-26

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumloader.oxy.st/get/7b82a5a4bac77e1841dc4bd261cfc4a4/Detects malware sample from Burning Umbrella report - Generic Winnti Rule
mediumloader.oxy.st/get/7b82a5a4bac77e1841dc4bd261cfc4a4/Detects malware from disclosed CN malware set
mediumloader.oxy.st/get/7b82a5a4bac77e1841dc4bd261cfc4a4/Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
mediumloader.oxy.st/get/7b82a5a4bac77e1841dc4bd261cfc4a4/Windows.Trojan.Njrat
mediums1.oxy.st/get.php?cg=czozMjoiMjJhZGVhZWE4YmFjYWIwMThhMzIzNDc0OTIzNmQ5ZTkiOw%2C%2C&n=czoxMjoiRnB4X2tva3MuZXhlIjs%2C&c=czo2NDoiNThhYWRjYWRjNDNjNTBhMzk0YTRjYmRkNDgxNjM3YzQ3YzM5NzM5ODQ0ODNhOWM2MGZmNTBlZjNlM2I0NWRlZiI7&t=1711687031Detects malware sample from Burning Umbrella report - Generic Winnti Rule
mediums1.oxy.st/get.php?cg=czozMjoiMjJhZGVhZWE4YmFjYWIwMThhMzIzNDc0OTIzNmQ5ZTkiOw%2C%2C&n=czoxMjoiRnB4X2tva3MuZXhlIjs%2C&c=czo2NDoiNThhYWRjYWRjNDNjNTBhMzk0YTRjYmRkNDgxNjM3YzQ3YzM5NzM5ODQ0ODNhOWM2MGZmNTBlZjNlM2I0NWRlZiI7&t=1711687031Detects malware from disclosed CN malware set
mediums1.oxy.st/get.php?cg=czozMjoiMjJhZGVhZWE4YmFjYWIwMThhMzIzNDc0OTIzNmQ5ZTkiOw%2C%2C&n=czoxMjoiRnB4X2tva3MuZXhlIjs%2C&c=czo2NDoiNThhYWRjYWRjNDNjNTBhMzk0YTRjYmRkNDgxNjM3YzQ3YzM5NzM5ODQ0ODNhOWM2MGZmNTBlZjNlM2I0NWRlZiI7&t=1711687031Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
mediums1.oxy.st/get.php?cg=czozMjoiMjJhZGVhZWE4YmFjYWIwMThhMzIzNDc0OTIzNmQ5ZTkiOw%2C%2C&n=czoxMjoiRnB4X2tva3MuZXhlIjs%2C&c=czo2NDoiNThhYWRjYWRjNDNjNTBhMzk0YTRjYmRkNDgxNjM3YzQ3YzM5NzM5ODQ0ODNhOWM2MGZmNTBlZjNlM2I0NWRlZiI7&t=1711687031Windows.Trojan.Njrat

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    loader.oxy.st/get/7b82a5a4bac77e1841dc4bd261cfc4a4/

  2. IP

    104.21.234.182

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    75 kB (74752 bytes)

  2. Hash

    1a7f6138f24a5b862de6a95b649fc0ce

    dfbc18bd76ba7902e49cf760f0077132033d63a3

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects malware sample from Burning Umbrella report - Generic Winnti Rule
    Public Nextron YARA rulesmalware
    Detects malware from disclosed CN malware set
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Njrat
    Public Nextron YARA rulesmalware
    Detects malware sample from Burning Umbrella report - Generic Winnti Rule
    Public Nextron YARA rulesmalware
    Detects malware from disclosed CN malware set
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Njrat
    VirusTotalmalicious
  1. URL

    s1.oxy.st/get.php?cg=czozMjoiMjJhZGVhZWE4YmFjYWIwMThhMzIzNDc0OTIzNmQ5ZTkiOw%2C%2C&n=czoxMjoiRnB4X2tva3MuZXhlIjs%2C&c=czo2NDoiNThhYWRjYWRjNDNjNTBhMzk0YTRjYmRkNDgxNjM3YzQ3YzM5NzM5ODQ0ODNhOWM2MGZmNTBlZjNlM2I0NWRlZiI7&t=1711687031

  2. IP

    104.21.234.182

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    75 kB (74752 bytes)

  2. Hash

    1a7f6138f24a5b862de6a95b649fc0ce

    dfbc18bd76ba7902e49cf760f0077132033d63a3

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects malware sample from Burning Umbrella report - Generic Winnti Rule
    Public Nextron YARA rulesmalware
    Detects malware from disclosed CN malware set
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Njrat
    Public Nextron YARA rulesmalware
    Detects malware sample from Burning Umbrella report - Generic Winnti Rule
    Public Nextron YARA rulesmalware
    Detects malware from disclosed CN malware set
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Njrat
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
loader.oxy.st/get/7b82a5a4bac77e1841dc4bd261cfc4a4/
104.21.234.182302 Found75 kB
s1.oxy.st/get.php?cg=czozMjoiMjJhZGVhZWE4YmFjYWIwMThhMzIzNDc0OTIzNmQ5ZTkiOw%2C%2C&n=czoxMjoiRnB4X2tva3MuZXhlIjs%2C&c=czo2NDoiNThhYWRjYWRjNDNjNTBhMzk0YTRjYmRkNDgxNjM3YzQ3YzM5NzM5ODQ0ODNhOWM2MGZmNTBlZjNlM2I0NWRlZiI7&t=1711687031
104.21.234.182200 OK75 kB