| 195.20.16.35/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll | 195.20.16.35 | 200 OK | 1.1 kB |
URL User Request GET HTTP/1.1195.20.16.35/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll IP 195.20.16.35:80
File typeASCII text, with very long lines (606) Hashc8cdc442dbd73d9d2b49abef9f75548c 63efd29a1c8784ee420e121c0d2a97ce4882c078 feb437d738a567f4409f72684daba5f36e80f8aa03941c86f863ca6e1a04b531
Analyzer | Verdict | Alert | ThreatFox | malicious | Raccoon | Quad9 DNS | malicious | Sinkholed |
NIDS | Severity | Alert | suricata | medium | ET INFO Dotted Quad Host DLL Request | suricata | medium | ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity | suricata | high | ThreatFox botnet C2 traffic (url - confidence level: 100%) |
GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll HTTP/1.1
Host: 195.20.16.35
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Fri, 01 Dec 2023 08:06:58 GMT
Server: Apache/2.4.41 (Ubuntu)
X-XSS-Protection: 1
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Access-Control-Allow-Origin: *
Access-Control-Allow-Headers: origin, x-requested-with, content-type
Access-Control-Allow-Methods: GET, POST
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 1095
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript; charset=UTF-8
|
IP 195.20.16.35:80
Requested byhttp://195.20.16.35/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll
File typeASCII text, with very long lines (606) Hashc7e6978589c1da74fe18aa35430e97c3 5c7368b5ac5fe9dc090c7b9fae649d207c106120 fa7a1b13734bc116b8dac7c7f7e4d4ee0aa1e029038c11642b8be42b8a8244ff
Analyzer | Verdict | Alert | ThreatFox | malicious | Raccoon | Quad9 DNS | malicious | Sinkholed |
NIDS | Severity | Alert | suricata | high | ThreatFox botnet C2 traffic (url - confidence level: 100%) |
GET /favicon.ico HTTP/1.1
Host: 195.20.16.35
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://195.20.16.35/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll
DNT: 1
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Fri, 01 Dec 2023 08:06:59 GMT
Server: Apache/2.4.41 (Ubuntu)
X-XSS-Protection: 1
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Access-Control-Allow-Origin: *
Access-Control-Allow-Headers: origin, x-requested-with, content-type
Access-Control-Allow-Methods: GET, POST
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 1057
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/x-javascript; charset=UTF-8
|