Report Overview

  1. Submitted URL

    201.220.155.206:52503/Mozi.a

  2. IP

    201.220.155.206

    ASN

    #52420 Intercom SRL

  3. Submitted

    2024-05-10 07:42:54

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    4

  3. Threat Detection Systems

    7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
201.220.155.206:52503unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
high 201.220.155.206Client IP
high 201.220.155.206Client IP
high 201.220.155.206Client IP
high 201.220.155.206Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium201.220.155.206:52503/Mozi.aDetects a suspicious ELF binary with UPX compression
medium201.220.155.206:52503/Mozi.aLinux.Packer.Patched_UPX

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium201.220.155.206Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    201.220.155.206:52503/Mozi.a

  2. IP

    201.220.155.206

  3. ASN

    #52420 Intercom SRL

  1. File type

    ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV)

    Size

    136 kB (135784 bytes)

  2. Hash

    59ce0baba11893f90527fc951ac69912

    5857a7dd621c4c3ebb0b5a3bec915d409f70d39f

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects a suspicious ELF binary with UPX compression
    Elastic Security YARA Rulesmalware
    Linux.Packer.Patched_UPX
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
201.220.155.206:52503/Mozi.a
201.220.155.206200 OK136 kB