{"report_id":"7587d873-cd30-4812-99fc-ddc98d4bf134","version":6,"status":"done","tags":[],"date":"2024-11-29T19:38:13Z","url":{"schema":"http","addr":"neirong.funshion.com/download/decoder/cook.dll","fqdn":"neirong.funshion.com","domain":"funshion.com","tld":"com"},"ip":{"addr":"61.184.10.34","port":0,"asn":4134,"as":"Chinanet","country":"China","country_code":"CN"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"","expires_at":"2027-02-07T19:38:13Z","useragent":"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"neirong.funshion.com","ip":{"addr":"61.184.10.38","port":443,"asn":4134,"as":"Chinanet","country":"China","country_code":"CN"},"domain_registered":"2005-08-22","domain_rank":271303,"first_seen":"2012-05-29T12:53:43Z","last_seen":"2024-11-25T10:44:59.162265Z","alert_count":1,"request_count":1,"received_data":71631,"sent_data":500,"comment":"","tags":null,"fingerprints":null}],"files":[{"md5":"e011f615e14c4615a2d602f65e1f3fe4","sha1":"7c9f20c6811f79ffc21ac7244ab114f66bf0a3c0","sha256":"c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","sha512":"a497193a375ceb716d46d0da77fd3f2a317bfe0607ff267ba7a3f769331efc4074e52f58e865af1f76a9054952bf112e23cf915ede01e5b9a957eebb3e7906ca","magic":"PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections","size":71304,"url":{"schema":"https","addr":"neirong.funshion.com/download/decoder/cook.dll","fqdn":"neirong.funshion.com","domain":"funshion.com","tld":"com"},"ip":{"addr":"61.184.10.38","port":443,"asn":4134,"as":"Chinanet","country":"China","country_code":"CN"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2021-11-30","alert":"Scan result 5/64","trigger":"c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","verdict":"suspicious","severity":"","comment":"suspicious - 5/64","link":"https://www.virustotal.com/gui/file/c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","meta":null}]}}],"artifacts":{"windows_shortcuts":null,"files":[{"md5":"e011f615e14c4615a2d602f65e1f3fe4","sha1":"7c9f20c6811f79ffc21ac7244ab114f66bf0a3c0","sha256":"c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","sha512":"a497193a375ceb716d46d0da77fd3f2a317bfe0607ff267ba7a3f769331efc4074e52f58e865af1f76a9054952bf112e23cf915ede01e5b9a957eebb3e7906ca","magic":"PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections","size":71304,"url":{"schema":"https","addr":"neirong.funshion.com/download/decoder/cook.dll","fqdn":"neirong.funshion.com","domain":"funshion.com","tld":"com"},"ip":{"addr":"61.184.10.38","port":443,"asn":4134,"as":"Chinanet","country":"China","country_code":"CN"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2021-11-30","alert":"Scan result 5/64","trigger":"c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","verdict":"suspicious","severity":"","comment":"suspicious - 5/64","link":"https://www.virustotal.com/gui/file/c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","meta":null}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":null}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":null},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"mnemonic_dns","type":"domain","description":"Mnemonic Secure DNS","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":null},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"https","addr":"neirong.funshion.com/download/decoder/cook.dll","fqdn":"neirong.funshion.com","domain":"funshion.com","tld":"com"},"ip":{"addr":"61.184.10.38","port":443,"asn":4134,"as":"Chinanet","country":"China","country_code":"CN"},"is_navigation_request":true,"resource_type":"document","requested_by":"","date":"2024-11-29T19:37:48.503Z","timestamp":1732909068503,"http_version":"HTTP/1.1","security_state":"secure","security_info":{"cipher_suite":"TLS_AES_256_GCM_SHA384","key_group_name":"x25519","signature_name":"RSA-PSS-SHA256","protocol":"TLSv1.3","cert":{"subject":{"commonName":"*.funshion.com","organization":""},"issuer":{"commonName":"GlobalSign GCC R3 DV TLS CA 2020","organization":"GlobalSign nv-sa"},"validity":{"start":"Mon, 18 Dec 2023 02:08:25 GMT","end":"Sat, 18 Jan 2025 02:08:24 GMT"},"fingerprint":{"sha1":"F8:10:F5:4C:B9:67:72:C9:21:4E:FD:9E:37:D8:E4:19:04:1C:D3:CA","sha256":"0D:26:6C:B8:23:B8:C7:97:C7:EF:82:E6:79:1E:07:C1:C8:44:B9:7F:AD:86:51:E4:4B:B6:6E:BF:30:7B:E2:55"}}},"request":{"raw":"GET /download/decoder/cook.dll HTTP/1.1\r\nHost: neirong.funshion.com\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate, br\r\nDNT: 1\r\nUpgrade-Insecure-Requests: 1\r\nConnection: keep-alive\r\nSec-Fetch-Dest: document\r\nSec-Fetch-Mode: navigate\r\nSec-Fetch-Site: cross-site\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/1.1 200 OK\r\nServer: openresty\r\nDate: Fri, 29 Nov 2024 19:37:49 GMT\r\nContent-Type: application/octet-stream\r\nContent-Length: 71304\r\nConnection: keep-alive\r\nLast-Modified: Thu, 26 Dec 2013 03:35:31 GMT\r\nETag: \"52bba403-11688\"\r\nX-Cache: HIT from sal-tln-jssq-p1-240-186, HIT from sal-ctc-hubxy-n-10-38\r\nAccept-Ranges: bytes\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":71304,"size_decoded":71304,"mime_type":"application/octet-stream","magic":"PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections","md5":"e011f615e14c4615a2d602f65e1f3fe4","sha1":"7c9f20c6811f79ffc21ac7244ab114f66bf0a3c0","sha256":"c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","sha512":"a497193a375ceb716d46d0da77fd3f2a317bfe0607ff267ba7a3f769331efc4074e52f58e865af1f76a9054952bf112e23cf915ede01e5b9a957eebb3e7906ca","ssdeep":"768:h9rczOVJc8avUhcRxV6Sz+b2G90YnGZosMwCJtVSk7K+t6tj6tVDWVp3Ghv+Xbwf:huqc8/aUSz62G9LnOnMK+t6tRw","tlshash":"fd636c819b950174eab3cd3171bb67faf739fe82ba31010b8360d5656c21e60a65a34f","first_seen":"2023-05-19T19:52:57Z","last_seen":"2025-05-19T04:48:29.438507Z","times_seen":298,"resource_available":false,"data":null}},"time_used":2229,"timings":{"blocked":649,"dns":1,"connect":288,"send":0,"wait":368,"receive":563,"ssl":357},"alerts":{"ids":null,"analyzer":[{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2021-11-30","alert":"Scan result 5/64","trigger":"c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","verdict":"suspicious","severity":"","comment":"suspicious - 5/64","link":"https://www.virustotal.com/gui/file/c9ad99f567e537add970e4a8d46acb847caed5effd42aa45fb5ec405c2d6d7eb","meta":null}],"urlquery":null}}]}
