Report Overview
Visitedpublic
2025-03-12 20:10:46
Tags
Submit Tags
URL
ashipetakun.com/wp2/tool/Ashipetakun1015.zip
Finishing URL
about:privatebrowsing
IP / ASN
183.90.250.43
#131965 Xserver Inc.
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
ashipetakun.com
unknown2019-01-162025-03-122025-03-12

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
ashipetakun.com/wp2/tool/Ashipetakun1015.zip
IP / ASN
183.90.250.43
#131965 Xserver Inc.
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size12 MB (12414379 bytes)
MD575d60681f4bf17d942b956780e6a2879
SHA10a9f4e9405a7748e044a3dcafa9520c50ddd7180
Archive (30)
FilenameMD5File type
303ZT.dll3fc7c6d35b24a581c3d34d034e1cdd2aPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
501HW.dll693b0a4b7b4974bb9303d5cbf6cb7b98PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
Ashipetakun.exe19dea9b66aab937ff4c309d721bd1bb3PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
AU_W.dllc5b43e763ca788b92f7b08e3dd897d54PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
AU_WX.dll3e982fff8ff2ff411383e8f98d16d81bPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
DynamicJson.dll9e09bb9c230f6a8ce0ae1da7d75798edPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
genre.txt5db9945a39eb8f82dfab5a89931c64aeCSV Non-ISO extended-ASCII text
License.dllf8349906641675952213c83bf0090e9aPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
log4net.configaa29f555cc956e45d10fce4d34452a3cXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
log4net.dll7ea1429e71d83a1ccaa0942c4d7f1c41PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
Ashipetakun.log509ff962d7966d0499b577e47b55b54dNon-ISO extended-ASCII text, with very long lines (360), with CRLF line terminators
Ashipetakun.log.2023-04-1192dac154a91de0ae1684b9c4291229e7Non-ISO extended-ASCII text, with very long lines (490), with CRLF line terminators
Ashipetakun.log.2023-04-19aeeb0f80d9cccf57ff530edd7b10ab30Non-ISO extended-ASCII text, with CRLF line terminators
Ashipetakun.log.2023-04-2387c85c7c93b2bab79b0c540e3bd016f9Non-ISO extended-ASCII text, with very long lines (570), with CRLF line terminators
Ashipetakun.log.2023-04-2495de7d0fef61ec407234865c0da0dd4fNon-ISO extended-ASCII text, with CRLF line terminators
Ashipetakun.log.2023-05-12a091563154987733b8e536942207336aNon-ISO extended-ASCII text, with very long lines (363), with CRLF, NEL line terminators
Ashipetakun.log.2023-05-198bd504758f17525ea292a4994a224f94Non-ISO extended-ASCII text, with CRLF line terminators
Ashipetakun.log.2023-08-27fbdbef800a59ccb8752da65605af31b6Non-ISO extended-ASCII text, with very long lines (490), with CRLF, NEL line terminators
Ashipetakun.log.2023-09-011ed1b843f04dd97170570ed99d080c96Non-ISO extended-ASCII text, with CRLF line terminators
Ashipetakun.log.2023-11-04197a8375269ba0c671c29b5fb43501d1Non-ISO extended-ASCII text, with CRLF line terminators
msedgedriver.exe0bc7895271e9fe1c963bb4f93c647325PE32+ executable (console) x86-64, for MS Windows, 13 sections
SB_HW.dllb3ef723afc45521477e1cb518d70fe7dPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
SB_ZT.dlla65affa162248af7d91167003e235045PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
useragent.txt9a4b62827105c8c4428c0371110bda64CSV ASCII text
W04.dll034b4c028809b379894fc0285fc0dafaPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
WebDriver.dlleba746c509b4f4039ab3bfa095c90e45PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
Wx02.dll017a32033e9e120e8a8020a46a6603e5PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
SQLite.Interop.dll19d10199a0f525e3b7416a7814aade1bPE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections
SQLite.Interop.dll75278f5ebe41817b2d85aff60f84f7c6PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
�L���b�V���N���A.lnk7e5a51d73bb506882f598a5e59e0953dMS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Unicoded, MachineID sirius, EnableTargetMetadata KnownFolderID 1AC14E77-02E7-4E5D-B744-2EB1AE5198B7, Archive, ctime=Wed Jun 14 13:09:01 2017, atime=Wed Jun 14 13:09:01 2017, mtime=Thu Mar 30 15:03:43 2017, length=46080, window=normal, IDListSize 0x0139, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Windows\System32\rundll32.exe"

Detections

AnalyzerVerdictAlert
Public InfoSec YARA rulesmalware
Identifies executable artefacts in shortcut (LNK) files.
Public InfoSec YARA rulesmalware
Identifies execution artefacts in shortcut (LNK) files.
Public InfoSec YARA rulesmalware
Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize