Report Overview

  1. Submitted URL

    192.140.225.33/phpmyadmin/Ganja180.exe

  2. IP

    192.140.225.33

    ASN

    #56233 PT Asia Teknologi Solusi

  3. Submitted

    2024-04-25 11:50:23

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    2

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
192.140.225.33unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
mediumClient IP 192.140.225.33
low 192.140.225.33Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium192.140.225.33/phpmyadmin/Ganja180.exeDetects suspicious file path pointing to the root of a folder easily accessible via environment variables

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium192.140.225.33Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    192.140.225.33/phpmyadmin/Ganja180.exe

  2. IP

    192.140.225.33

  3. ASN

    #56233 PT Asia Teknologi Solusi

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections

    Size

    31 kB (30720 bytes)

  2. Hash

    d9c6da282d0a97b34b99e8c246f6ad16

    91dd8a3854aad6425132f637dac81418361c50fe

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious file path pointing to the root of a folder easily accessible via environment variables
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
192.140.225.33/phpmyadmin/Ganja180.exe
192.140.225.33200 OK31 kB