{"report_id":"0c4eb864-f349-4905-a1b9-68f4362a0d10","version":6,"status":"done","tags":[],"date":"2025-05-23T04:39:09Z","url":{"schema":"http","addr":"1.234.66.181:15788/zal.exe","fqdn":"1.234.66.181","domain":"1.234.66.181","tld":""},"ip":{"addr":"1.234.66.181","port":0,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"desktop","expires_at":"2027-08-01T04:39:09Z","useragent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"1.234.66.181","ip":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"domain_registered":"unknown","domain_rank":0,"first_seen":"No data","last_seen":"No data","alert_count":2,"request_count":1,"received_data":309734,"sent_data":410,"comment":"","tags":null,"fingerprints":null}],"files":[{"md5":"b80bfb4d339121d2260d2c96cda92df4","sha1":"488089d47a14462a795866cdbe19cf17f08ebbaf","sha256":"8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","sha512":"505356d5cfeb309dad40ff0019bc2e80d7936fa195e11c2f8bbc2a8d05d967ca810b1bddab30a37bb22fe287e85bc9b939738c3ce182673cb6b8bd4b4b2e37ca","magic":"PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections","size":309380,"url":{"schema":"http","addr":"1.234.66.181:15788/zal.exe","fqdn":"1.234.66.181","domain":"1.234.66.181","tld":""},"ip":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-05-20","alert":"Scan result 35/71","trigger":"8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","verdict":"malicious","severity":"","comment":"malicious - 35/71","link":"https://www.virustotal.com/gui/file/8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","meta":null}]}}],"artifacts":{"windows_shortcuts":null,"files":[{"md5":"b80bfb4d339121d2260d2c96cda92df4","sha1":"488089d47a14462a795866cdbe19cf17f08ebbaf","sha256":"8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","sha512":"505356d5cfeb309dad40ff0019bc2e80d7936fa195e11c2f8bbc2a8d05d967ca810b1bddab30a37bb22fe287e85bc9b939738c3ce182673cb6b8bd4b4b2e37ca","magic":"PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections","size":309380,"url":{"schema":"http","addr":"1.234.66.181:15788/zal.exe","fqdn":"1.234.66.181","domain":"1.234.66.181","tld":""},"ip":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-05-20","alert":"Scan result 35/71","trigger":"8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","verdict":"malicious","severity":"","comment":"malicious - 35/71","link":"https://www.virustotal.com/gui/file/8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","meta":null}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":[{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:37Z","timestamp":1747975117,"ip_dst":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"high","alert":"URLhaus Known malware download URL detected (3531322)","source":"{\"timestamp\":\"2025-05-23T04:38:37.892001+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":47440,\"dest_ip\":\"1.234.66.181\",\"dest_port\":15788,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":84394422,\"rev\":1,\"signature\":\"URLhaus Known malware download URL detected (3531322)\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"metadata\":{\"created_at\":[\"2025_04_30\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":2,\"bytes_toserver\":682,\"bytes_toclient\":494,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:37Z","timestamp":1747975117,"ip_dst":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET INFO Executable Download from dotted-quad Host","source":"{\"timestamp\":\"2025-05-23T04:38:37.892001+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":47440,\"dest_ip\":\"1.234.66.181\",\"dest_port\":15788,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2016141,\"rev\":9,\"signature\":\"ET INFO Executable Download from dotted-quad Host\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"attack_target\":[\"Client_and_Server\"],\"confidence\":[\"High\"],\"created_at\":[\"2013_01_03\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Significant\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2024_04_09\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":2,\"bytes_toserver\":682,\"bytes_toclient\":494,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:37Z","timestamp":1747975117,"ip_dst":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile","source":"{\"timestamp\":\"2025-05-23T04:38:37.892001+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":47440,\"dest_ip\":\"1.234.66.181\",\"dest_port\":15788,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2019714,\"rev\":13,\"signature\":\"ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"confidence\":[\"Medium\"],\"created_at\":[\"2014_11_15\"],\"performance_impact\":[\"Significant\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2024_04_22\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":2,\"bytes_toserver\":682,\"bytes_toclient\":494,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:37Z","timestamp":1747975117,"ip_dst":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"severity":"high","alert":"ET HUNTING Rejetto HTTP File Sever Response","source":"{\"timestamp\":\"2025-05-23T04:38:37.892063+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"1.234.66.181\",\"src_port\":15788,\"dest_ip\":\"172.18.0.21\",\"dest_port\":47440,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2045860,\"rev\":1,\"signature\":\"ET HUNTING Rejetto HTTP File Sever Response\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"source\":{\"ip\":\"172.18.0.21\",\"port\":47440},\"target\":{\"ip\":\"1.234.66.181\",\"port\":15788},\"metadata\":{\"affected_product\":[\"HTTP_Server\"],\"attack_target\":[\"Client_and_Server\"],\"confidence\":[\"High\"],\"created_at\":[\"2023_05_24\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Low\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2023_05_24\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":682,\"bytes_toclient\":2008,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:38Z","timestamp":1747975118,"ip_dst":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"severity":"high","alert":"ET POLICY PE EXE or DLL Windows file download HTTP","source":"{\"timestamp\":\"2025-05-23T04:38:38.442781+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"1.234.66.181\",\"src_port\":15788,\"dest_ip\":\"172.18.0.21\",\"dest_port\":47440,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\",\"ET.http.binary\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2018959,\"rev\":5,\"signature\":\"ET POLICY PE EXE or DLL Windows file download HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"confidence\":[\"High\"],\"created_at\":[\"2014_08_19\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2025_01_16\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":40880},\"files\":[{\"filename\":\"zal.exe\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":40880,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":46,\"bytes_toserver\":1870,\"bytes_toclient\":45726,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:38Z","timestamp":1747975118,"ip_dst":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"severity":"high","alert":"ET EXPLOIT_KIT DRIVEBY Likely Evil EXE with no referer from HFS webserver (used by Unknown EK)","source":"{\"timestamp\":\"2025-05-23T04:38:38.442781+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"1.234.66.181\",\"src_port\":15788,\"dest_ip\":\"172.18.0.21\",\"dest_port\":47440,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\",\"ET.http.binary\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2020500,\"rev\":4,\"signature\":\"ET EXPLOIT_KIT DRIVEBY Likely Evil EXE with no referer from HFS webserver (used by Unknown EK)\",\"category\":\"Exploit Kit Activity Detected\",\"severity\":1,\"metadata\":{\"affected_product\":[\"Any\"],\"attack_target\":[\"Client_Endpoint\"],\"confidence\":[\"Medium\"],\"created_at\":[\"2015_02_23\"],\"deployment\":[\"Perimeter\"],\"signature_severity\":[\"Major\"],\"tag\":[\"DriveBy\"],\"updated_at\":[\"2020_05_15\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":40880},\"files\":[{\"filename\":\"zal.exe\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":40880,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":46,\"bytes_toserver\":1870,\"bytes_toclient\":45726,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:38Z","timestamp":1747975118,"ip_dst":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"severity":"medium","alert":"ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response","source":"{\"timestamp\":\"2025-05-23T04:38:38.442781+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"1.234.66.181\",\"src_port\":15788,\"dest_ip\":\"172.18.0.21\",\"dest_port\":47440,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\",\"ET.http.binary\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2021076,\"rev\":2,\"signature\":\"ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"confidence\":[\"Medium\"],\"created_at\":[\"2015_05_08\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2019_07_26\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":40880},\"files\":[{\"filename\":\"zal.exe\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":40880,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":46,\"bytes_toserver\":1870,\"bytes_toclient\":45726,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-05-23T04:38:38Z","timestamp":1747975118,"ip_dst":{"addr":"172.18.0.21","port":47440,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"severity":"low","alert":"ET INFO EXE - Served Attached HTTP","source":"{\"timestamp\":\"2025-05-23T04:38:38.442781+0000\",\"flow_id\":1878068869007843,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"1.234.66.181\",\"src_port\":15788,\"dest_ip\":\"172.18.0.21\",\"dest_port\":47440,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"exe.no.referer\",\"http.dottedquadhost\",\"ET.http.binary\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2014520,\"rev\":8,\"signature\":\"ET INFO EXE - Served Attached HTTP\",\"category\":\"Misc activity\",\"severity\":3,\"metadata\":{\"confidence\":[\"High\"],\"created_at\":[\"2012_04_06\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2022_11_30\"]}},\"http\":{\"hostname\":\"1.234.66.181\",\"http_port\":15788,\"url\":\"/zal.exe\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/octet-stream\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":40880},\"files\":[{\"filename\":\"zal.exe\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":40880,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":46,\"bytes_toserver\":1870,\"bytes_toclient\":45726,\"start\":\"2025-05-23T04:38:37.330211+0000\"}}"}]}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":null},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":[{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2025-05-22","alert":"Sinkholed","trigger":"1.234.66.181","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null}]},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null,"console":null},"http":[{"url":{"schema":"http","addr":"1.234.66.181:15788/zal.exe","fqdn":"1.234.66.181","domain":"1.234.66.181","tld":""},"ip":{"addr":"1.234.66.181","port":15788,"asn":9318,"as":"SK Broadband Co Ltd","country":"South Korea","country_code":"KR"},"is_navigation_request":true,"resource_type":"","requested_by":"","date":"2025-05-23T04:38:37.337Z","timestamp":0,"http_version":"","security_state":"insecure","security_info":null,"request":{"raw":"GET /zal.exe HTTP/1.1\r\nHost: 1.234.66.181:15788\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nDNT: 1\r\nConnection: keep-alive\r\nUpgrade-Insecure-Requests: 1\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/1.1 200 OK\r\nContent-Type: application/octet-stream\r\nContent-Length: 309380\r\nAccept-Ranges: bytes\r\nServer: HFS 2.4.0 RC7\r\nSet-Cookie: HFS_SID_=PaYWMRJd5kAAAEAeNh7ZPw; path=/; HttpOnly\r\nETag: 2da35b36a753d89bdee7c0ee9110f2f3\r\nLast-Modified: Tue, 20 May 2025 13:07:48 GMT\r\nContent-Disposition: attachment; filename*=UTF-8''zal.exe; filename=zal.exe\r\n\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":309380,"size_decoded":0,"mime_type":"application/octet-stream","magic":"PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections","md5":"b80bfb4d339121d2260d2c96cda92df4","sha1":"488089d47a14462a795866cdbe19cf17f08ebbaf","sha256":"8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","sha512":"505356d5cfeb309dad40ff0019bc2e80d7936fa195e11c2f8bbc2a8d05d967ca810b1bddab30a37bb22fe287e85bc9b939738c3ce182673cb6b8bd4b4b2e37ca","ssdeep":"6144:OsVXQRbbCKrjv1dufr1dsBVwuyNLcms8sSWPwuKU7psi2jFkmGgCX/2J:rQRP3rTg2DNXIpU7nvmhlJ","tlshash":"2464c093f3c188b1f2210a788c56d5b69b3abe311d69e317b3e86e0f7d79345205c296","first_seen":"2025-05-21T19:43:12.29883Z","last_seen":"2025-05-27T16:28:02.952911Z","times_seen":3,"resource_available":false,"data":null}},"time_used":2320,"timings":{"blocked":272,"dns":0,"connect":278,"send":0,"wait":283,"receive":1486,"ssl":0},"alerts":{"ids":null,"analyzer":[{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2025-05-22","alert":"Sinkholed","trigger":"1.234.66.181","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-05-20","alert":"Scan result 35/71","trigger":"8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","verdict":"malicious","severity":"","comment":"malicious - 35/71","link":"https://www.virustotal.com/gui/file/8842f45f9e02753f61077a790c4da8d5888201dafe15d66586f87f5749aa1c9e","meta":null}],"urlquery":null}}]}
