Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
r2.byster.one | unknown | 2023-01-09 | 2024-10-26 | 2024-10-26 | 499 B | 459 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2024-10-26 | medium | r2.byster.one/uploads/2024/02/29/dcontrol.exe | Detects malware by known bad imphash or rich_pe_header_hash |
2024-10-26 | medium | r2.byster.one/uploads/2024/02/29/dcontrol.exe | Identifies Defender Control, used by attackers to disable Windows Defender. |
OpenPhish
No alerts detected
PhishTank
No alerts detected
Mnemonic Secure DNS
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
r2.byster.one/uploads/2024/02/29/dcontrol.exe
IP
104.26.12.130
ASN
#13335 CLOUDFLARENET
File type
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
Size
458 kB (457984 bytes)
Hash
58008524a6473bdf86c1040a9a9e39c3
cb704d2e8df80fd3500a5b817966dc262d80ddb8
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects malware by known bad imphash or rich_pe_header_hash |
Public InfoSec YARA rules | malware | Identifies Defender Control, used by attackers to disable Windows Defender. |
VirusTotal | malicious | |
ClamAV | malicious | Win.Tool.Disabledefender-9973916-0 |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
r2.byster.one/uploads/2024/02/29/dcontrol.exe | ![]() | 200 OK | 458 kB | ||||||||||||||||
Detections
HTTP Headers
| |||||||||||||||||||