Report Overview

  1. Visited public
    2024-06-05 00:05:24
    Tags
  2. URL

    server.cnc-kovey.ru/nznsnSCwZ356pP/Aqua.spc

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    104.21.85.7

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
server.cnc-kovey.ruunknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumserver.cnc-kovey.ru/nznsnSCwZ356pP/Aqua.spcDetects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
mediumserver.cnc-kovey.ru/nznsnSCwZ356pP/Aqua.spcLinux.Trojan.Gafgyt

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    server.cnc-kovey.ru/nznsnSCwZ356pP/Aqua.spc

  2. IP

    172.67.200.110

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    ELF 32-bit MSB executable, SPARC, version 1 (SYSV)

    Size

    86 kB (86072 bytes)

  2. Hash

    db4718c3ef59997acc5d405d542ac9db

    dc22907abafe6f5aa9d2dc17016ba6b8aaf061e5

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
    Elastic Security YARA Rulesmalware
    Linux.Trojan.Gafgyt
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
server.cnc-kovey.ru/nznsnSCwZ356pP/Aqua.spc
172.67.200.110200 OK86 kB