Report Overview

  1. Visited public
    2024-06-11 21:46:31
    Tags
  2. URL

    r57txt.org/wsoshell/wso.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    172.67.214.199

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
r57txt.orgunknown2022-05-212012-11-29 22:29:162024-02-21 06:35:42

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    r57txt.org/wsoshell/wso.zip

  2. IP

    172.67.214.199

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    220 kB (219613 bytes)

  2. Hash

    e6a8de2da8ee22a4007064d48d05eb69

    3ff4f5d725a579ae3e1ee21695d439a01376ab65

  1. Archive (2)

  2. FilenameMd5File type
    pass.txt
    60a4cd57adeee7e538d8e024af2bbd34
    ASCII text, with no line terminators
    wso2023.php
    817755e08a086fbdf0fa83f383915d0b
    PHP script, ASCII text, with very long lines (65264), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    PHP webshell obfuscated by encoding of mixed hex and dec
    Public Nextron YARA rulesmalware
    PHP webshell using $a($code) for kind of eval with encoded blob to decode, e.g. b374k
    Public Nextron YARA rulesmalware
    PHP webshell using some kind of eval with encoded blob to decode

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
r57txt.org/wsoshell/wso.zip
172.67.214.199200 OK220 kB