Report Overview

  1. Submitted URL

    omitec.net/remoto/ultraviewer.zip

  2. IP

    132.148.114.127

    ASN

    #398101 GO-DADDY-COM-LLC

  3. Submitted

    2024-04-19 03:28:35

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
omitec.netunknown2017-02-142015-04-262024-03-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    omitec.net/remoto/ultraviewer.zip

  2. IP

    132.148.114.127

  3. ASN

    #398101 GO-DADDY-COM-LLC

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    61 kB (61175 bytes)

  2. Hash

    888438c78ab79895e6a0b2235332f51e

    3f6ad9907a01729a0cc1e99ff5aa2d298739970b

  1. Archive (4)

  2. FilenameMd5File type
    QuickSupportDefaultSettings.ini
    5455bdab2aed07cfc98e634a4d93b67f
    ASCII text, with CRLF line terminators
    ReadMe.txt
    ce416e47024fd35134e72249e0a0f606
    ASCII text, with CRLF line terminators
    UltraViewerQS.exe
    81fe064d145eeb226fd446ac01865e59
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    UltraViewerQS.exe.config
    679aca3e8125584e8704b2dfdfa20a0b
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
omitec.net/remoto/ultraviewer.zip
132.148.114.127200 OK61 kB