Report Overview

  1. Submitted URL

    modsengine.com/modengine.zip

  2. IP

    188.114.97.1

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-03-29 15:16:41

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    11

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
modsengine.comunknown2023-01-242023-05-042024-03-27

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    modsengine.com/modengine.zip

  2. IP

    188.114.96.1

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    19 MB (18698471 bytes)

  2. Hash

    4a4c702c597743f157d72a97c5301337

    30c8d75193ba88e1cd8d9251033a4b9d535d0445

  1. Archive (15)

  2. FilenameMd5File type
    additional_settings.lua
    1f73e4d6e1a5c6eb97b31813ec21d0db
    JavaScript source, ASCII text, with CRLF line terminators
    DotNetInterface.dll
    5b12656d94b4bbb14c7c59d2c34c3c0b
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    MonoDataCollector32.dll
    36a5efb2e73e652216c58d7cf8402748
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    MonoDataCollector64.dll
    9f12c94f8b3d5c5c07d6e510ea10fe3a
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    monoscript.lua
    cd5bb3f15cb7a9dad2dfcd90b58a8413
    ASCII text, with CRLF line terminators
    lua53-32.dll
    dde3f283f576c0469443f6a59adaca76
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    lua53-64.dll
    13100b2466570bf52c48725199c4e3c6
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    ModEngine.exe
    33517ce98b6c73b0e77982a30631ff90
    PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 12 sections
    settings.lua
    3c24f79cb4ee296d67aee81a52292ff8
    ASCII text, with CRLF line terminators
    speedhack-i386.dll
    4acc9d3311fff9d1ac7697010b43f90b
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections
    speedhack-x86_64.dll
    156249ce92b9a15d71c39160dc05b4a1
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections
    sqlite.dll
    c11138204609ea63a3e88b4c8c09b035
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
    startModEngine.exe
    a037e213e1b9345111fa62434eb9bde2
    PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
    vehdebug-i386.dll
    e427a09c9df940d8e642679a0742079c
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections
    vehdebug-x86_64.dll
    fbaf0bf6e47e4026997be3c2f4eb5599
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
modsengine.com/modengine.zip
188.114.96.1200 OK19 MB