Report Overview

  1. Visited public
    2024-10-26 06:15:09
    Tags
  2. URL

    r2.byster.one/uploads/2024/02/29/dcontrol.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    172.67.68.8

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
r2.byster.oneunknown2023-01-092024-10-262024-10-26

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumr2.byster.one/uploads/2024/02/29/dcontrol.exeDetects malware by known bad imphash or rich_pe_header_hash
mediumr2.byster.one/uploads/2024/02/29/dcontrol.exeIdentifies Defender Control, used by attackers to disable Windows Defender.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    r2.byster.one/uploads/2024/02/29/dcontrol.exe

  2. IP

    104.26.12.130

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections

    Size

    458 kB (457984 bytes)

  2. Hash

    58008524a6473bdf86c1040a9a9e39c3

    cb704d2e8df80fd3500a5b817966dc262d80ddb8

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects malware by known bad imphash or rich_pe_header_hash
    Public InfoSec YARA rulesmalware
    Identifies Defender Control, used by attackers to disable Windows Defender.
    VirusTotalmalicious
    ClamAVmalicious
    Win.Tool.Disabledefender-9973916-0

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
r2.byster.one/uploads/2024/02/29/dcontrol.exe
104.26.12.130200 OK458 kB