Report Overview

  1. Visited public
    2024-07-21 20:58:22
    Tags
  2. URL

    z0mbie.dreamhosters.com/z0mbie4c.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    67.205.31.22

    #26347 DREAMHOST-AS

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
r10.o.lencr.orgunknown2020-06-292024-06-06 21:45:112024-07-21 18:21:45
z0mbie.dreamhosters.comunknown2004-11-032022-06-15 04:37:222024-03-14 17:18:17

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    z0mbie.dreamhosters.com/z0mbie4c.zip

  2. IP

    67.205.31.22

  3. ASN

    #26347 DREAMHOST-AS

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    37 kB (36996 bytes)

  2. Hash

    d363239a2a4517839c46a6700c4010aa

    6ba1cc003122d4d8439535274d00db41bd77d8b6

  1. Archive (13)

  2. FilenameMd5File type
    ASM.BAT
    8c3ce4348c5a5885f9e4cddc8058857d
    DOS batch file, ASCII text, with CRLF line terminators
    DROPCODE.INC
    f07de49fcba3bcd3e7d7a847ee31e38f
    ASCII text, with CRLF line terminators
    IMPORT.INC
    b40c36bd2abd62e70121c7d597533618
    ASCII text, with CRLF line terminators
    KILLAVXD.INC
    d6a252f39fe273577d92a48c391fb09d
    ASCII text, with CRLF line terminators
    KME32.INT
    c8c53e34b0d45f741e0a372b73638945
    ASCII text, with CRLF line terminators
    KME32BIN.INC
    902f70ab47c5e98574651433b8cbbd4b
    ASCII text, with CRLF line terminators
    R0IO.INC
    7f5cd34325590c05927121d922881751
    ASCII text, with CRLF line terminators
    RING3.INC
    bd781b87829bd3f93b91dd7eca2aa8b3
    JavaScript source, ASCII text, with CRLF line terminators
    Z0MBIE4C.INC
    45e0b6298d98ccafc805a80201f0e884
    ASCII text, with CRLF line terminators
    Z0MBIE4C.ASM
    b310d7877eeb19791d49167fd84002b5
    Generic INItialization configuration [eax]
    RUNDLL16.EX$
    cbb2ea97a87cc0e0c08281801acbcb2c
    PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    PBRUSH.EX$
    f0158700615db33aca3168c8e9cd93a4
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    FILE_ID.DIZ
    82ebf4131c6e9ca97c940a8ef54ac885
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (9)

URLIPResponseSize
r10.o.lencr.org/
23.36.76.226 504 B
r10.o.lencr.org/
23.36.76.226 504 B
r10.o.lencr.org/
23.36.76.226 504 B
r10.o.lencr.org/
23.36.76.226 504 B
z0mbie.dreamhosters.com/z0mbie4c.zip
67.205.31.22200 OK37 kB
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B