{"report_id":"69a5c2d7-9931-4c49-af5e-42a774d1d092","version":6,"status":"done","tags":[],"date":"2025-04-17T17:57:41Z","url":{"schema":"http","addr":"112.217.207.130/js/s.rar","fqdn":"112.217.207.130","domain":"112.217.207.130","tld":""},"ip":{"addr":"112.217.207.130","port":0,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"desktop","expires_at":"2027-06-26T17:57:41Z","useragent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"112.217.207.130","ip":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"domain_registered":"unknown","domain_rank":0,"first_seen":"No data","last_seen":"No data","alert_count":14,"request_count":2,"received_data":5389565,"sent_data":900,"comment":"","tags":null,"fingerprints":null}],"files":[{"md5":"2a0d26b8b02bb2d17994d2a9a38d61db","sha1":"889a9cb0a044c1f675e63ea6ea065a8cf914e2ab","sha256":"3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","sha512":"07245fb329b5fc9b68e1e88a52b7ab464bafd45442193e4b61cf6788ec0e10cdec2cfa2f59f49fe4a3f8a78a205d62ec0701a3b82a5e8f4257016821fee524ee","magic":"PE32+ executable (console) x86-64, for MS Windows, 10 sections","size":5389312,"url":{"schema":"http","addr":"112.217.207.130/js/s.rar","fqdn":"112.217.207.130","domain":"112.217.207.130","tld":""},"ip":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects XMRIG crypto coin miners","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2020-12-31","description":"Detects XMRIG crypto coin miners","hash1":"b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09","reference":"https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/","rule":"PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero Crypto Coin Miner","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2019-05-31","description":"Detects Monero Crypto Coin Miner","hash1":"d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc","reference":"https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/","rule":"MAL_XMR_Miner_May19_1","score":"85"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero mining software","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2018-01-04","description":"Detects Monero mining software","hash1":"5c13a274adb9590249546495446bb6be5f2a08f9dcd2fc8a2049d9dc471135c0","hash2":"08b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7","hash3":"f3f2703a7959183b010d808521b531559650f6f347a5830e47f8e3831b10bad5","hash4":"0972ea3a41655968f063c91a6dbd31788b20e64ff272b27961d12c681e40b2d2","license":"Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE","modified":"2022-11-10","reference":"https://github.com/xmrig/xmrig/releases","rule":"XMRIG_Monero_Miner"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Generic","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"baa9e777683d31c27170239752f162799a511bf40269a06a2eab8971fabb098a","id":"333129b7-8137-4641-bd86-ebcf62257d7b","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"bf47d27351d6b0be0ffe1d6844e87fe8f4f4d33ea17b85c11907266d36e4b827","rule":"MacOS_Cryptominer_Generic_333129b7","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Generic"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Xmrig","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8","id":"241780a1-ad50-4ded-b85a-26339ae5a632","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f","rule":"MacOS_Cryptominer_Xmrig_241780a1","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Xmrig"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-03-27","alert":"Scan result 62/72","trigger":"3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","verdict":"malicious","severity":"","comment":"malicious - 62/72","link":"https://www.virustotal.com/gui/file/3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","meta":null}]}}],"artifacts":{"windows_shortcuts":null,"files":[{"md5":"2a0d26b8b02bb2d17994d2a9a38d61db","sha1":"889a9cb0a044c1f675e63ea6ea065a8cf914e2ab","sha256":"3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","sha512":"07245fb329b5fc9b68e1e88a52b7ab464bafd45442193e4b61cf6788ec0e10cdec2cfa2f59f49fe4a3f8a78a205d62ec0701a3b82a5e8f4257016821fee524ee","magic":"PE32+ executable (console) x86-64, for MS Windows, 10 sections","size":5389312,"url":{"schema":"http","addr":"112.217.207.130/js/s.rar","fqdn":"112.217.207.130","domain":"112.217.207.130","tld":""},"ip":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects XMRIG crypto coin miners","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2020-12-31","description":"Detects XMRIG crypto coin miners","hash1":"b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09","reference":"https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/","rule":"PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero Crypto Coin Miner","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2019-05-31","description":"Detects Monero Crypto Coin Miner","hash1":"d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc","reference":"https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/","rule":"MAL_XMR_Miner_May19_1","score":"85"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero mining software","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2018-01-04","description":"Detects Monero mining software","hash1":"5c13a274adb9590249546495446bb6be5f2a08f9dcd2fc8a2049d9dc471135c0","hash2":"08b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7","hash3":"f3f2703a7959183b010d808521b531559650f6f347a5830e47f8e3831b10bad5","hash4":"0972ea3a41655968f063c91a6dbd31788b20e64ff272b27961d12c681e40b2d2","license":"Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE","modified":"2022-11-10","reference":"https://github.com/xmrig/xmrig/releases","rule":"XMRIG_Monero_Miner"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Generic","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"baa9e777683d31c27170239752f162799a511bf40269a06a2eab8971fabb098a","id":"333129b7-8137-4641-bd86-ebcf62257d7b","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"bf47d27351d6b0be0ffe1d6844e87fe8f4f4d33ea17b85c11907266d36e4b827","rule":"MacOS_Cryptominer_Generic_333129b7","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Generic"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Xmrig","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8","id":"241780a1-ad50-4ded-b85a-26339ae5a632","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f","rule":"MacOS_Cryptominer_Xmrig_241780a1","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Xmrig"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-03-27","alert":"Scan result 62/72","trigger":"3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","verdict":"malicious","severity":"","comment":"malicious - 62/72","link":"https://www.virustotal.com/gui/file/3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","meta":null}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":[{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:19Z","timestamp":1744912639,"ip_dst":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET INFO Dotted Quad Host RAR Request","source":"{\"timestamp\":\"2025-04-17T17:57:19.899863+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":60144,\"dest_ip\":\"112.217.207.130\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2027266,\"rev\":4,\"signature\":\"ET INFO Dotted Quad Host RAR Request\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"attack_target\":[\"Client_Endpoint\"],\"confidence\":[\"High\"],\"created_at\":[\"2019_04_23\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Significant\"],\"signature_severity\":[\"Minor\"],\"updated_at\":[\"2020_04_08\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":680,\"bytes_toclient\":459,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:19Z","timestamp":1744912639,"ip_dst":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"high","alert":"URLhaus Known malware download URL detected (3243121)","source":"{\"timestamp\":\"2025-04-17T17:57:19.899863+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":60144,\"dest_ip\":\"112.217.207.130\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":84106221,\"rev\":1,\"signature\":\"URLhaus Known malware download URL detected (3243121)\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"metadata\":{\"created_at\":[\"2024_10_19\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":680,\"bytes_toclient\":459,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:20Z","timestamp":1744912640,"ip_dst":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"severity":"high","alert":"ET POLICY PE EXE or DLL Windows file download HTTP","source":"{\"timestamp\":\"2025-04-17T17:57:20.482197+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"112.217.207.130\",\"src_port\":80,\"dest_ip\":\"172.18.0.21\",\"dest_port\":60144,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\",\"ET.Meterpreter.Receiving\",\"ET.http.binary\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2018959,\"rev\":5,\"signature\":\"ET POLICY PE EXE or DLL Windows file download HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"confidence\":[\"High\"],\"created_at\":[\"2014_08_19\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2025_01_16\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":43440},\"files\":[{\"filename\":\"/js/s.rar\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":43440,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":34,\"bytes_toserver\":1868,\"bytes_toclient\":47393,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"}]}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects XMRIG crypto coin miners","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2020-12-31","description":"Detects XMRIG crypto coin miners","hash1":"b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09","reference":"https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/","rule":"PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero Crypto Coin Miner","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2019-05-31","description":"Detects Monero Crypto Coin Miner","hash1":"d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc","reference":"https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/","rule":"MAL_XMR_Miner_May19_1","score":"85"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero mining software","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2018-01-04","description":"Detects Monero mining software","hash1":"5c13a274adb9590249546495446bb6be5f2a08f9dcd2fc8a2049d9dc471135c0","hash2":"08b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7","hash3":"f3f2703a7959183b010d808521b531559650f6f347a5830e47f8e3831b10bad5","hash4":"0972ea3a41655968f063c91a6dbd31788b20e64ff272b27961d12c681e40b2d2","license":"Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE","modified":"2022-11-10","reference":"https://github.com/xmrig/xmrig/releases","rule":"XMRIG_Monero_Miner"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Generic","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"baa9e777683d31c27170239752f162799a511bf40269a06a2eab8971fabb098a","id":"333129b7-8137-4641-bd86-ebcf62257d7b","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"bf47d27351d6b0be0ffe1d6844e87fe8f4f4d33ea17b85c11907266d36e4b827","rule":"MacOS_Cryptominer_Generic_333129b7","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Generic"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Xmrig","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8","id":"241780a1-ad50-4ded-b85a-26339ae5a632","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f","rule":"MacOS_Cryptominer_Xmrig_241780a1","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Xmrig"}}]},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":[{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2025-04-17","alert":"Sinkholed","trigger":"112.217.207.130","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null},{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2025-04-17","alert":"Sinkholed","trigger":"112.217.207.130","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null}]},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"http","addr":"112.217.207.130/js/s.rar","fqdn":"112.217.207.130","domain":"112.217.207.130","tld":""},"ip":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"is_navigation_request":true,"resource_type":"","requested_by":"","date":"2025-04-17T17:57:19.323Z","timestamp":0,"http_version":"","security_state":"insecure","security_info":null,"request":{"raw":"GET /js/s.rar HTTP/1.1\r\nHost: 112.217.207.130\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nDNT: 1\r\nConnection: keep-alive\r\nUpgrade-Insecure-Requests: 1\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/1.1 200 OK\r\nServer: Apache-Coyote/1.1\r\nAccept-Ranges: bytes\r\nETag: W/\"5389312-1704195094241\"\r\nLast-Modified: Tue, 02 Jan 2024 11:31:34 GMT\r\nContent-Type: application/x-rar-compressed\r\nContent-Length: 5389312\r\nDate: Thu, 17 Apr 2025 17:57:19 GMT\r\n\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":5389312,"size_decoded":0,"mime_type":"application/x-rar-compressed","magic":"PE32+ executable (console) x86-64, for MS Windows, 10 sections","md5":"2a0d26b8b02bb2d17994d2a9a38d61db","sha1":"889a9cb0a044c1f675e63ea6ea065a8cf914e2ab","sha256":"3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","sha512":"07245fb329b5fc9b68e1e88a52b7ab464bafd45442193e4b61cf6788ec0e10cdec2cfa2f59f49fe4a3f8a78a205d62ec0701a3b82a5e8f4257016821fee524ee","ssdeep":"98304:jZlzjjErvvBIvXFYUxGgrrHWbQuaX6s1dICNSCcKxzLOpB:rjjAbQDX6nCNSjCKp","tlshash":"3646ae16b2a500e8c8bbc17cc6479a17e7b2b8594370abdf17b452690f237d16e3eb11","first_seen":"2023-04-07T16:29:48Z","last_seen":"2025-05-04T07:27:11.648611Z","times_seen":156,"resource_available":false,"data":null}},"time_used":3890,"timings":{"blocked":286,"dns":0,"connect":292,"send":0,"wait":291,"receive":3021,"ssl":0},"alerts":{"ids":[{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:19Z","timestamp":1744912639,"ip_dst":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET INFO Dotted Quad Host RAR Request","source":"{\"timestamp\":\"2025-04-17T17:57:19.899863+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":60144,\"dest_ip\":\"112.217.207.130\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2027266,\"rev\":4,\"signature\":\"ET INFO Dotted Quad Host RAR Request\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"attack_target\":[\"Client_Endpoint\"],\"confidence\":[\"High\"],\"created_at\":[\"2019_04_23\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Significant\"],\"signature_severity\":[\"Minor\"],\"updated_at\":[\"2020_04_08\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":680,\"bytes_toclient\":459,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:19Z","timestamp":1744912639,"ip_dst":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"high","alert":"URLhaus Known malware download URL detected (3243121)","source":"{\"timestamp\":\"2025-04-17T17:57:19.899863+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":60144,\"dest_ip\":\"112.217.207.130\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":84106221,\"rev\":1,\"signature\":\"URLhaus Known malware download URL detected (3243121)\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"metadata\":{\"created_at\":[\"2024_10_19\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":680,\"bytes_toclient\":459,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:20Z","timestamp":1744912640,"ip_dst":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"severity":"high","alert":"ET POLICY PE EXE or DLL Windows file download HTTP","source":"{\"timestamp\":\"2025-04-17T17:57:20.482197+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"112.217.207.130\",\"src_port\":80,\"dest_ip\":\"172.18.0.21\",\"dest_port\":60144,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\",\"ET.Meterpreter.Receiving\",\"ET.http.binary\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2018959,\"rev\":5,\"signature\":\"ET POLICY PE EXE or DLL Windows file download HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"confidence\":[\"High\"],\"created_at\":[\"2014_08_19\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2025_01_16\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":43440},\"files\":[{\"filename\":\"/js/s.rar\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":43440,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":34,\"bytes_toserver\":1868,\"bytes_toclient\":47393,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"}],"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects XMRIG crypto coin miners","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2020-12-31","description":"Detects XMRIG crypto coin miners","hash1":"b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09","reference":"https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/","rule":"PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero Crypto Coin Miner","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2019-05-31","description":"Detects Monero Crypto Coin Miner","hash1":"d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc","reference":"https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/","rule":"MAL_XMR_Miner_May19_1","score":"85"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2025-04-17","alert":"Detects Monero mining software","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2018-01-04","description":"Detects Monero mining software","hash1":"5c13a274adb9590249546495446bb6be5f2a08f9dcd2fc8a2049d9dc471135c0","hash2":"08b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7","hash3":"f3f2703a7959183b010d808521b531559650f6f347a5830e47f8e3831b10bad5","hash4":"0972ea3a41655968f063c91a6dbd31788b20e64ff272b27961d12c681e40b2d2","license":"Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE","modified":"2022-11-10","reference":"https://github.com/xmrig/xmrig/releases","rule":"XMRIG_Monero_Miner"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Generic","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"baa9e777683d31c27170239752f162799a511bf40269a06a2eab8971fabb098a","id":"333129b7-8137-4641-bd86-ebcf62257d7b","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"bf47d27351d6b0be0ffe1d6844e87fe8f4f4d33ea17b85c11907266d36e4b827","rule":"MacOS_Cryptominer_Generic_333129b7","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Generic"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2025-04-17","alert":"MacOS.Cryptominer.Xmrig","trigger":"112.217.207.130/js/s.rar","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-09-30","fingerprint":"be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8","id":"241780a1-ad50-4ded-b85a-26339ae5a632","last_modified":"2021-10-25","license":"Elastic License v2","os":"macos","reference_sample":"2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f","rule":"MacOS_Cryptominer_Xmrig_241780a1","scan_context":"file, memory","severity":"100","threat_name":"MacOS.Cryptominer.Xmrig"}},{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2025-04-17","alert":"Sinkholed","trigger":"112.217.207.130","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-03-27","alert":"Scan result 62/72","trigger":"3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","verdict":"malicious","severity":"","comment":"malicious - 62/72","link":"https://www.virustotal.com/gui/file/3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1","meta":null}],"urlquery":null}},{"url":{"schema":"https","addr":"112.217.207.130/js/s.rar","fqdn":"112.217.207.130","domain":"112.217.207.130","tld":""},"ip":{"addr":"0.0.0.0","port":0,"asn":0,"as":"","country":"","country_code":"zz"},"is_navigation_request":true,"resource_type":"","requested_by":"","date":"2025-04-17T17:57:18.413Z","timestamp":0,"http_version":"","security_state":"insecure","security_info":null,"request":{"raw":"GET /js/s.rar HTTP/1.1\r\nHost: 112.217.207.130\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate, br\r\nDNT: 1\r\nUpgrade-Insecure-Requests: 1\r\nConnection: keep-alive\r\nSec-Fetch-Dest: document\r\nSec-Fetch-Mode: navigate\r\nSec-Fetch-Site: cross-site\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"","headers":null,"cookies":null,"status_code":"","status_text":"","fingerprints":null,"data":{"size":0,"size_decoded":0,"mime_type":"","magic":"","md5":"d41d8cd98f00b204e9800998ecf8427e","sha1":"da39a3ee5e6b4b0d3255bfef95601890afd80709","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","sha512":"cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e","ssdeep":"","tlshash":"","first_seen":"0001-01-01T00:00:00Z","last_seen":"2026-04-05T14:47:06.668895Z","times_seen":13379084,"resource_available":true,"data":null}},"time_used":566,"timings":{"blocked":566,"dns":0,"connect":0,"send":0,"wait":0,"receive":0,"ssl":0},"alerts":{"ids":[{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:19Z","timestamp":1744912639,"ip_dst":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET INFO Dotted Quad Host RAR Request","source":"{\"timestamp\":\"2025-04-17T17:57:19.899863+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":60144,\"dest_ip\":\"112.217.207.130\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2027266,\"rev\":4,\"signature\":\"ET INFO Dotted Quad Host RAR Request\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"attack_target\":[\"Client_Endpoint\"],\"confidence\":[\"High\"],\"created_at\":[\"2019_04_23\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Significant\"],\"signature_severity\":[\"Minor\"],\"updated_at\":[\"2020_04_08\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":680,\"bytes_toclient\":459,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:19Z","timestamp":1744912639,"ip_dst":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"ip_src":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"high","alert":"URLhaus Known malware download URL detected (3243121)","source":"{\"timestamp\":\"2025-04-17T17:57:19.899863+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.21\",\"src_port\":60144,\"dest_ip\":\"112.217.207.130\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":84106221,\"rev\":1,\"signature\":\"URLhaus Known malware download URL detected (3243121)\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"metadata\":{\"created_at\":[\"2024_10_19\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":0},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":680,\"bytes_toclient\":459,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2025-04-17T17:57:20Z","timestamp":1744912640,"ip_dst":{"addr":"172.18.0.21","port":60144,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"112.217.207.130","port":80,"asn":3786,"as":"LG DACOM Corporation","country":"South Korea","country_code":"KR"},"severity":"high","alert":"ET POLICY PE EXE or DLL Windows file download HTTP","source":"{\"timestamp\":\"2025-04-17T17:57:20.482197+0000\",\"flow_id\":1487807826613749,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"112.217.207.130\",\"src_port\":80,\"dest_ip\":\"172.18.0.21\",\"dest_port\":60144,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.rar\",\"ET.Meterpreter.Receiving\",\"ET.http.binary\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2018959,\"rev\":5,\"signature\":\"ET POLICY PE EXE or DLL Windows file download HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"confidence\":[\"High\"],\"created_at\":[\"2014_08_19\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2025_01_16\"]}},\"http\":{\"hostname\":\"112.217.207.130\",\"url\":\"/js/s.rar\",\"http_user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\",\"http_content_type\":\"application/x-rar-compressed\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":43440},\"files\":[{\"filename\":\"/js/s.rar\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":43440,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":34,\"bytes_toserver\":1868,\"bytes_toclient\":47393,\"start\":\"2025-04-17T17:57:19.316917+0000\"}}"}],"analyzer":[{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2025-04-17","alert":"Sinkholed","trigger":"112.217.207.130","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null}],"urlquery":null}}]}
