Report Overview

  1. Visited public
    2024-11-02 14:31:55
    Tags
  2. URL

    d552lcnlgbcqg.cloudfront.net/WLMM/MWxGELeDp/kFm7vhR/ratatouille-0-installer.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    143.204.42.182

    #16509 AMAZON-02

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
d552lcnlgbcqg.cloudfront.netunknown2008-04-252024-10-132024-10-27

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumd552lcnlgbcqg.cloudfront.net/WLMM/MWxGELeDp/kFm7vhR/ratatouille-0-installer.exemeth_get_eip
mediumd552lcnlgbcqg.cloudfront.net/WLMM/MWxGELeDp/kFm7vhR/ratatouille-0-installer.exepe_detect_tls_callbacks

OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    d552lcnlgbcqg.cloudfront.net/WLMM/MWxGELeDp/kFm7vhR/ratatouille-0-installer.exe

  2. IP

    143.204.42.188

  3. ASN

    #16509 AMAZON-02

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Size

    4.5 MB (4450744 bytes)

  2. Hash

    72366c2e104cabbbb3d718203521cc60

    69c06646c360f3e15f303ef3f2d15bb39736c8ba

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
d552lcnlgbcqg.cloudfront.net/WLMM/MWxGELeDp/kFm7vhR/ratatouille-0-installer.exe
143.204.42.188200 OK4.5 MB