Report Overview

  1. Visited public
    2023-11-27 23:32:43
    Tags
  2. URL

    cnom.sante.gov.ml/12

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    41.73.116.156

    #30985 IKATELNET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
6
Threat Detection Systems
7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cnom.sante.gov.mlunknownunknown2018-04-17 12:21:192023-11-28 00:26:37

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IPInternal IP
mediumClient IP 41.73.116.156
highClient IP 41.73.116.156
mediumClient IP 41.73.116.156
high 41.73.116.156Client IP
medium 41.73.116.156Client IP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumcnom.sante.gov.ml/12meth_get_eip
mediumcnom.sante.gov.ml/12Linux.Exploit.Vmsplice
mediumcnom.sante.gov.ml/12Linux.Exploit.Vmsplice

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cnom.sante.gov.ml/12

  2. IP

    41.73.116.156

  3. ASN

    #30985 IKATELNET

  1. File type

    ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV)\012- data

    Size

    8.7 kB (8679 bytes)

  2. Hash

    cf6c56ba83b118b59339fd973facc936

    dc5c121f2f9943df69c40e73e8458e44f1d460b3

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    Elastic Security YARA Rulesmalware
    Linux.Exploit.Vmsplice
    Elastic Security YARA Rulesmalware
    Linux.Exploit.Vmsplice
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
cnom.sante.gov.ml/
41.73.116.156 5.9 kB
cnom.sante.gov.ml/12
41.73.116.156 8.7 kB