Report Overview

  1. Submitted URL

    drive.wortmann.de/files/4358151464/WORTMANN_309.b01.zip

  2. IP

    195.4.167.105

    ASN

    #60175 Wortmann Ag

  3. Submitted

    2024-04-23 06:32:44

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
drive.wortmann.deunknownunknown2015-10-292023-02-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


Files detected

  1. URL

    drive.wortmann.de/files/4358151464/WORTMANN_309.b01.zip

  2. IP

    195.4.167.105

  3. ASN

    #60175 Wortmann Ag

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    3.3 MB (3272055 bytes)

  2. Hash

    c3138165231b30533903b081d9076c68

    f5f5b5e3fe6b43d82a2d372435a0f56d9938a5da

  1. Archive (6)

  2. FilenameMd5File type
    CHKC915.EXE
    3b7df6fe8c15f48ef75ebcb64e7e6024
    MS-DOS executable, MZ for MS-DOS
    DISEUP.EXE
    cdc750e597b97bfb5175b59f8309f827
    MS-DOS executable, MZ for MS-DOS
    DS81D000.309
    f41020259c143ec4179edcc1eb46ede3
    Intel serial flash for PCH ROM
    FLASH.bat
    237c4e18662bb87a3631468c3ca96990
    DOS batch file, ASCII text, with CRLF line terminators
    fparts.txt
    25087267f8d50457c7f36cce727fe3e2
    ASCII text, with CRLF line terminators
    fpt.exe
    a0e4d5daf1ed28d9d728679a747a8ef6
    MS-DOS executable, LE executable for MS-DOS, PMODE/W DOS extender

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
drive.wortmann.de/files/4358151464/WORTMANN_309.b01.zip
195.4.167.105200 OK3.3 MB