Report Overview

  1. Submitted URL

    192.3.109.131:222/gg.jpg

  2. IP

    192.3.109.131

    ASN

    #36352 AS-COLOCROSSING

  3. Submitted

    2024-04-18 04:30:34

    Access

    public

  4. Website Title

    gg.jpg (JPEG Image)

  5. Final URL

    192.3.109.131:222/gg.jpg

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
192.3.109.131:222unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium192.3.109.131Sinkholed
medium192.3.109.131Sinkholed

ThreatFox

No alerts detected


Files detected

  1. URL

    192.3.109.131:222/gg.jpg

  2. IP

    192.3.109.131

  3. ASN

    #36352 AS-COLOCROSSING

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    1.2 MB (1197404 bytes)

  2. Hash

    6996cd294c0d1fce23b58c8a9de0e6e5

    3120ed3299e4f0ebfc7f23979e75d4b35d87dc8c

  1. Archive (12)

  2. FilenameMd5File type
    app.js
    020931b25df865f336d1fad370483c86
    ASCII text, with CRLF line terminators
    basta.js
    784f1c1543327e48d9ce460f71168a78
    ASCII text, with CRLF line terminators
    Execute.txt
    40cd014b7b6251e3a22e6a45a73a64e1
    ASCII text, with no line terminators
    getMethod.txt
    db37f91f128a82062af0f39f649ea122
    ASCII text, with no line terminators
    Gettype.txt
    9221b7b54ed96de7281d31f8ae35be6a
    ASCII text, with no line terminators
    in.bat
    bb21f82f2d5a609ddbe2c7aad80e7ed2
    DOS batch file, ASCII text, with CRLF line terminators
    Invoke.txt
    5fb833d20ef9f93596f4117a81523536
    ASCII text, with no line terminators
    load.txt
    ec4d1eb36b22d19728e9d1d23ca84d1c
    ASCII text, with no line terminators
    msg.txt
    1b0daed821fc529ff81504ae0000c0a6
    ASCII text, with very long lines (65536), with no line terminators
    NewPE2.txt
    8a56a0e23dbfe7a50c5ec927b73ec5f2
    ASCII text, with no line terminators
    run.js
    10e7cd7d128fa09a878c60aef4f9b19c
    JavaScript source, ASCII text, with CRLF line terminators
    runpe.txt
    d8b31f56c1521b86c18171f00a15a5c2
    ASCII text, with very long lines (65536), with no line terminators

    Detections

    AnalyzerVerdictAlert
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
192.3.109.131:222/gg.jpg
192.3.109.131200 OK1.2 MB
192.3.109.131:222/favicon.ico
192.3.109.131404 Not Found300 B