Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1229970562655322213/1237211122709561406/zeus_loader.zip?ex=663ad225&is=663980a5&hm=2f58821d41bebbd3fb6e489e4d568614a342e7e4a6f463400ff4f46fa8030e29&

  2. IP

    162.159.134.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-05-07 02:50:55

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-05-05

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1229970562655322213/1237211122709561406/zeus_loader.zip?ex=663ad225&is=663980a5&hm=2f58821d41bebbd3fb6e489e4d568614a342e7e4a6f463400ff4f46fa8030e29&

  2. IP

    162.159.130.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    20 MB (19879839 bytes)

  2. Hash

    332ebcb1d18fe5a3392421794c61e3fd

    4e676dae7dfa9e88dba9f5b5ec26ff396b1493ef

  1. Archive (3)

  2. FilenameMd5File type
    zeus_loader.exe
    17c7d44edf335e78f85096c435907b6d
    PE32+ executable (console) x86-64, for MS Windows, 7 sections
    AutoHotkey.exe
    05ab9caf507005f4d02ba92fe23ea65b
    MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Archive, ctime=Sun May 5 04:12:33 2024, mtime=Sun May 5 04:12:33 2024, atime=Sun May 5 04:12:32 2024, length=1262592, window=hide
    read me.txt
    2320a8f6e72fb1ad08c556502efb3edb
    ASCII text, with no line terminators

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies executable artefacts in shortcut (LNK) files.
    Public InfoSec YARA rulesmalware
    Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1229970562655322213/1237211122709561406/zeus_loader.zip?ex=663ad225&is=663980a5&hm=2f58821d41bebbd3fb6e489e4d568614a342e7e4a6f463400ff4f46fa8030e29&
162.159.130.233200 OK20 MB