Report Overview

  1. Submitted URL

    ppcdn.dxinzf.com/ppstatic/prod/oem/744/PPSetup_744_23.11.23.1.exe

  2. IP

    180.163.207.106

    ASN

    #4812 China Telecom Group

  3. Submitted

    2024-05-10 12:12:04

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
ocsp.digicert.cn375722006-01-242020-03-202024-05-08
ppcdn.dxinzf.comunknown2013-04-172023-09-152024-04-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumppcdn.dxinzf.com/ppstatic/prod/oem/744/PPSetup_744_23.11.23.1.exeFind driver signed by suspicious company (see references)
mediumppcdn.dxinzf.com/ppstatic/prod/oem/744/PPSetup_744_23.11.23.1.exemeth_get_eip

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    ppcdn.dxinzf.com/ppstatic/prod/oem/744/PPSetup_744_23.11.23.1.exe

  2. IP

    180.163.207.104

  3. ASN

    #4812 China Telecom Group

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections

    Size

    3.2 MB (3223232 bytes)

  2. Hash

    bfc3952f806665d6330a86c797242eb9

    db7791d4f92e526fad2646f69e7b801d96b5dac7

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Find driver signed by suspicious company (see references)
    YARAhub by abuse.chmalware
    meth_get_eip

JavaScript (0)

HTTP Transactions (3)

URLIPResponseSize
ocsp.digicert.cn/
47.246.3.235 471 B
ocsp.digicert.cn/
47.246.3.235 471 B
ppcdn.dxinzf.com/ppstatic/prod/oem/744/PPSetup_744_23.11.23.1.exe
180.163.207.104200 OK3.2 MB