Report Overview

  1. Submitted URL

    loader.oxy.st/get/8e94b09a77ba657ca8123252b9535b94/evilcode.exe

  2. IP

    104.21.234.182

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-18 02:13:01

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    10

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
s1.oxy.stunknown2019-11-032022-06-042024-04-15
loader.oxy.stunknown2019-11-032022-10-192024-04-17

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediums1.oxy.st/get.php?cg=czozMjoiZWI3MjVmOTI0NGNhOTI2Mzk4ZTFkYmEzMmUwOTZjYTUiOw%2C%2C&n=czoxMjoiZXZpbGNvZGUuZXhlIjs%2C&c=czo2NDoiYzc1MjI3MWRkYWMzYTE5ZDYwMjE4ZDhhMjE1YzhhMjFmZDVlY2E4Mzk2MTk3ZTM5NmEzOTBkOGRlMGU2MzEwYiI7&t=1713406353Detects malware sample from Burning Umbrella report - Generic Winnti Rule
mediums1.oxy.st/get.php?cg=czozMjoiZWI3MjVmOTI0NGNhOTI2Mzk4ZTFkYmEzMmUwOTZjYTUiOw%2C%2C&n=czoxMjoiZXZpbGNvZGUuZXhlIjs%2C&c=czo2NDoiYzc1MjI3MWRkYWMzYTE5ZDYwMjE4ZDhhMjE1YzhhMjFmZDVlY2E4Mzk2MTk3ZTM5NmEzOTBkOGRlMGU2MzEwYiI7&t=1713406353Detects malware from disclosed CN malware set
mediums1.oxy.st/get.php?cg=czozMjoiZWI3MjVmOTI0NGNhOTI2Mzk4ZTFkYmEzMmUwOTZjYTUiOw%2C%2C&n=czoxMjoiZXZpbGNvZGUuZXhlIjs%2C&c=czo2NDoiYzc1MjI3MWRkYWMzYTE5ZDYwMjE4ZDhhMjE1YzhhMjFmZDVlY2E4Mzk2MTk3ZTM5NmEzOTBkOGRlMGU2MzEwYiI7&t=1713406353Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
mediums1.oxy.st/get.php?cg=czozMjoiZWI3MjVmOTI0NGNhOTI2Mzk4ZTFkYmEzMmUwOTZjYTUiOw%2C%2C&n=czoxMjoiZXZpbGNvZGUuZXhlIjs%2C&c=czo2NDoiYzc1MjI3MWRkYWMzYTE5ZDYwMjE4ZDhhMjE1YzhhMjFmZDVlY2E4Mzk2MTk3ZTM5NmEzOTBkOGRlMGU2MzEwYiI7&t=1713406353Windows.Trojan.Njrat
mediums1.oxy.st/get.php?cg=czozMjoiZWI3MjVmOTI0NGNhOTI2Mzk4ZTFkYmEzMmUwOTZjYTUiOw%2C%2C&n=czoxMjoiZXZpbGNvZGUuZXhlIjs%2C&c=czo2NDoiYzc1MjI3MWRkYWMzYTE5ZDYwMjE4ZDhhMjE1YzhhMjFmZDVlY2E4Mzk2MTk3ZTM5NmEzOTBkOGRlMGU2MzEwYiI7&t=1713406353Windows.Trojan.Njrat

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    s1.oxy.st/get.php?cg=czozMjoiZWI3MjVmOTI0NGNhOTI2Mzk4ZTFkYmEzMmUwOTZjYTUiOw%2C%2C&n=czoxMjoiZXZpbGNvZGUuZXhlIjs%2C&c=czo2NDoiYzc1MjI3MWRkYWMzYTE5ZDYwMjE4ZDhhMjE1YzhhMjFmZDVlY2E4Mzk2MTk3ZTM5NmEzOTBkOGRlMGU2MzEwYiI7&t=1713406353

  2. IP

    104.21.234.183

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 2 sections

    Size

    95 kB (95232 bytes)

  2. Hash

    ea8918fe1577cf70c2859553067b0d23

    c8155f06ed0e611015bd848cf3dfc22471fe6d58

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects malware sample from Burning Umbrella report - Generic Winnti Rule
    Public Nextron YARA rulesmalware
    Detects malware from disclosed CN malware set
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Njrat
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Njrat

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
s1.oxy.st/get.php?cg=czozMjoiZWI3MjVmOTI0NGNhOTI2Mzk4ZTFkYmEzMmUwOTZjYTUiOw%2C%2C&n=czoxMjoiZXZpbGNvZGUuZXhlIjs%2C&c=czo2NDoiYzc1MjI3MWRkYWMzYTE5ZDYwMjE4ZDhhMjE1YzhhMjFmZDVlY2E4Mzk2MTk3ZTM5NmEzOTBkOGRlMGU2MzEwYiI7&t=1713406353
104.21.234.183200 OK95 kB
loader.oxy.st/get/8e94b09a77ba657ca8123252b9535b94/evilcode.exe
104.21.234.183302 Found95 kB