Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
dl.packetstormsecurity.net | unknown | 2001-04-09 | 2012-05-25 | 2025-05-29 | 509 B | 342 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
dl.packetstormsecurity.net/Win/spc002.zip
IP
198.84.60.200
ASN
#54876 ROKABEAR
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
342 kB (341606 bytes)
Hash
34e74754ad55579b62e5340b1f1b4a72
60d425e5c236cf1b13681a4e1af04d1107339e4b
Archive (3)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
SPC.exe.sig | a88b09a5c65e3c6c26e4ddedf066ef59 | data | ||||||
SPC.exe | 0a428c30c21f263f2084eb6404835f9a
| PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections | ||||||
SPC.txt | adcc762d4f2cd6ff17b3825527ac98de | Non-ISO extended-ASCII text, with very long lines (517), with CRLF line terminators |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Scans presence of the found strings using the in-house brute force method |
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
dl.packetstormsecurity.net/Win/spc002.zip | ![]() | 200 OK | 342 kB | |||||||
Detections
HTTP Headers
| ||||||||||