Report Overview

  1. Submitted URL

    www.specialksoftware.com/rummy.zip

  2. IP

    173.254.30.127

    ASN

    #46606 UNIFIEDLAYER-AS-1

  3. Submitted

    2024-05-07 13:49:09

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.specialksoftware.comunknown2001-07-082012-05-302020-06-11

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.specialksoftware.com/rummy.zip

  2. IP

    173.254.30.127

  3. ASN

    #46606 UNIFIEDLAYER-AS-1

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    4.0 MB (3955760 bytes)

  2. Hash

    c671c57a03f3c6d2a42a1af141baec71

    110c1770080575f1be7453fa7d5e4a3478696d63

  1. Archive (7)

  2. FilenameMd5File type
    file_id.diz
    aef48ea110479809f350de44e70ba97c
    ASCII text, with CRLF line terminators
    read.me
    a5538776b65023a3c9336650585ed0a1
    ASCII text, with CRLF line terminators
    rummy1.CAB
    16ac0c0895972112f031f0a632cbae45
    Microsoft Cabinet archive data, many, 1163666 bytes, 8 files, at 0x44 last modified Sun, Jul 14 2009 12:15:52 +A "MSVBVM60.DLL" last modified Sun, Apr 14 2008 11:12:02 +A "OLEAUT32.DLL", flags 0x4, ID 10185, number 1, extra bytes 20 in head, 70 datablocks, 0x1 compression
    rummy2.CAB
    e47d4c7b1c3d56032f28920b08632e6a
    Microsoft Cabinet archive data, many, 1033734 bytes, 8 files, at 0x44 last modified Sun, Jan 01 2024 16:19:06 +A "rummy.exe" last modified Sun, Feb 16 2010 16:22:44 +A "PICCLP32.OCX", flags 0x4, ID 5933, number 1, extra bytes 20 in head, 99 datablocks, 0x1 compression
    rummy3.CAB
    45e1e7a3fdd346dcd09683b5d80bba80
    Microsoft Cabinet archive data, many, 1660941 bytes, 22 files, at 0x44 last modified Sun, Feb 06 2000 13:59:32 +A "4.crd" last modified Sun, Aug 30 2009 23:30:00 +A "5.crd", flags 0x4, ID 16932, number 1, extra bytes 20 in head, 161 datablocks, 0x1 compression
    setup.exe
    1c8eb8f83336f7bbcb8ac1adc2a9243f
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    setup.lst
    a16ee788eee4cf94a77c9ed4fa00505c
    Generic INItialization configuration [Bootstrap Files]

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.specialksoftware.com/rummy.zip
173.254.30.127200 OK4.0 MB