Report Overview

  1. Submitted URL

    download.cleanmoon.cn/wke/forox.rar

  2. IP

    61.160.192.99

    ASN

    #4134 Chinanet

  3. Submitted

    2024-03-28 16:36:03

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
download.cleanmoon.cnunknown2019-02-222023-08-062024-03-22

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    download.cleanmoon.cn/wke/forox.rar

  2. IP

    61.160.192.99

  3. ASN

    #4134 Chinanet

  1. File type

    7-zip archive data, version 0.4

    Size

    7.4 MB (7388987 bytes)

  2. Hash

    5ff9cc536ccca046d331e1130d7115d3

    693f1bf81915d3f70c0f72167d2051b9ea283193

  1. Archive (1)

  2. FilenameMd5File type
    kit.dt
    db307bc925386bec924632f2af1ce244
    DOS executable (COM), start instruction 0xeb030000 0a000000

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
    Public Nextron YARA rulesmalware
    Detects suspicious XORed MSDOS stub message

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
download.cleanmoon.cn/wke/forox.rar
61.160.192.99200 OK7.4 MB