{"report_id":"b79feef3-0376-4f2e-bee0-16d82e4f2054","version":6,"status":"done","tags":[],"date":"2024-11-29T18:38:42Z","url":{"schema":"http","addr":"files.catbox.moe/n8ow9e.dll","fqdn":"files.catbox.moe","domain":"catbox.moe","tld":"moe"},"ip":{"addr":"108.181.20.35","port":0,"asn":40676,"as":"AS40676","country":"United States","country_code":"US"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"","expires_at":"2027-02-07T18:38:42Z","useragent":"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"files.catbox.moe","ip":{"addr":"108.181.20.35","port":443,"asn":40676,"as":"AS40676","country":"United States","country_code":"US"},"domain_registered":"2015-04-06","domain_rank":174913,"first_seen":"2015-06-30T01:27:11Z","last_seen":"2024-11-27T12:09:43.211039Z","alert_count":2,"request_count":1,"received_data":817188,"sent_data":481,"comment":"","tags":null,"fingerprints":null}],"files":[{"md5":"7d13add48b8fddcd9c86879979aef481","sha1":"6777bb5bb7b0e43d0889b3b64884f8b60659195f","sha256":"640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","sha512":"1ad8196a42ed09fd90aa07f9628d68b4b09a9160aabd22edb3da9a16d93313bd93577c105739e4acc2edc55b659851fbc782158a7fc43c52f7222a014f4befa7","magic":"PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections","size":816640,"url":{"schema":"https","addr":"files.catbox.moe/n8ow9e.dll","fqdn":"files.catbox.moe","domain":"catbox.moe","tld":"moe"},"ip":{"addr":"108.181.20.35","port":443,"asn":40676,"as":"AS40676","country":"United States","country_code":"US"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"files - file ~tmp01925d3f.exe","trigger":"files.catbox.moe/n8ow9e.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"The DFIR Report","date":"2021-02-22","description":"files - file ~tmp01925d3f.exe","hash1":"10ff83629d727df428af1f57c524e1eaddeefd608c5a317a5bfc13e2df87fb63","reference":"https://thedfirreport.com","rule":"cobalt_strike_tmp01925d3f","score":"80","yarahub_license":"CC0 1.0","yarahub_reference_md5":"1c6ba04dc9808084846ac1005deb9c85","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"58ae3b15-154e-47e9-a24c-c8b885a4cd55"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2024-11-27","alert":"Scan result 54/71","trigger":"640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","verdict":"malicious","severity":"","comment":"malicious - 54/71","link":"https://www.virustotal.com/gui/file/640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","meta":null}]}}],"artifacts":{"windows_shortcuts":null,"files":[{"md5":"7d13add48b8fddcd9c86879979aef481","sha1":"6777bb5bb7b0e43d0889b3b64884f8b60659195f","sha256":"640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","sha512":"1ad8196a42ed09fd90aa07f9628d68b4b09a9160aabd22edb3da9a16d93313bd93577c105739e4acc2edc55b659851fbc782158a7fc43c52f7222a014f4befa7","magic":"PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections","size":816640,"url":{"schema":"https","addr":"files.catbox.moe/n8ow9e.dll","fqdn":"files.catbox.moe","domain":"catbox.moe","tld":"moe"},"ip":{"addr":"108.181.20.35","port":443,"asn":40676,"as":"AS40676","country":"United States","country_code":"US"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"files - file ~tmp01925d3f.exe","trigger":"files.catbox.moe/n8ow9e.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"The DFIR Report","date":"2021-02-22","description":"files - file ~tmp01925d3f.exe","hash1":"10ff83629d727df428af1f57c524e1eaddeefd608c5a317a5bfc13e2df87fb63","reference":"https://thedfirreport.com","rule":"cobalt_strike_tmp01925d3f","score":"80","yarahub_license":"CC0 1.0","yarahub_reference_md5":"1c6ba04dc9808084846ac1005deb9c85","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"58ae3b15-154e-47e9-a24c-c8b885a4cd55"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2024-11-27","alert":"Scan result 54/71","trigger":"640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","verdict":"malicious","severity":"","comment":"malicious - 54/71","link":"https://www.virustotal.com/gui/file/640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","meta":null}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":[{"sensor_name":"suricata","title":"","description":"","date":"2024-11-29T18:38:17Z","timestamp":1732905497,"ip_dst":{"addr":"108.181.20.35","port":443,"asn":40676,"as":"AS40676","country":"United States","country_code":"US"},"ip_src":{"addr":"172.18.0.3","port":34128,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI)","source":"{\"timestamp\":\"2024-11-29T18:38:17.688445+0000\",\"flow_id\":1739167719054797,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.3\",\"src_port\":34128,\"dest_ip\":\"108.181.20.35\",\"dest_port\":443,\"proto\":\"TCP\",\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2038639,\"rev\":1,\"signature\":\"ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI)\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"attack_target\":[\"Client_Endpoint\"],\"created_at\":[\"2022_08_29\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Low\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2022_08_29\"]}},\"tls\":{\"sni\":\"files.catbox.moe\",\"version\":\"TLS 1.3\",\"ja3\":{\"hash\":\"0faf2a91198d40dbd58b9308f3fca2fd\",\"string\":\"771,4865-4867-4866-49195-49199-52393-52392-49196-49200-49171-49172-156-157-47-53,0-23-65281-10-11-16-5-34-51-43-13-28-65037,29-23-24-25-256-257,0\"},\"ja3s\":{\"hash\":\"15af977ce25de452b96affa2addb1036\",\"string\":\"771,4866,43-51\"}},\"app_proto\":\"tls\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":918,\"bytes_toclient\":305,\"start\":\"2024-11-29T18:38:17.351693+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-11-29T18:38:17Z","timestamp":1732905497,"ip_dst":{"addr":"108.181.20.35","port":443,"asn":40676,"as":"AS40676","country":"United States","country_code":"US"},"ip_src":{"addr":"172.18.0.3","port":34128,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ETPRO INFO .moe Domain in TLS SNI","source":"{\"timestamp\":\"2024-11-29T18:38:17.688445+0000\",\"flow_id\":1739167719054797,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.3\",\"src_port\":34128,\"dest_ip\":\"108.181.20.35\",\"dest_port\":443,\"proto\":\"TCP\",\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2827579,\"rev\":7,\"signature\":\"ETPRO INFO .moe Domain in TLS SNI\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"affected_product\":[\"Windows_XP_Vista_7_8_10_Server_32_64_Bit\"],\"attack_target\":[\"Client_Endpoint\"],\"created_at\":[\"2017_08_17\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Moderate\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2022_11_21\"]}},\"tls\":{\"sni\":\"files.catbox.moe\",\"version\":\"TLS 1.3\",\"ja3\":{\"hash\":\"0faf2a91198d40dbd58b9308f3fca2fd\",\"string\":\"771,4865-4867-4866-49195-49199-52393-52392-49196-49200-49171-49172-156-157-47-53,0-23-65281-10-11-16-5-34-51-43-13-28-65037,29-23-24-25-256-257,0\"},\"ja3s\":{\"hash\":\"15af977ce25de452b96affa2addb1036\",\"string\":\"771,4866,43-51\"}},\"app_proto\":\"tls\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":3,\"bytes_toserver\":918,\"bytes_toclient\":305,\"start\":\"2024-11-29T18:38:17.351693+0000\"}}"}]}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"files - file ~tmp01925d3f.exe","trigger":"files.catbox.moe/n8ow9e.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"The DFIR Report","date":"2021-02-22","description":"files - file ~tmp01925d3f.exe","hash1":"10ff83629d727df428af1f57c524e1eaddeefd608c5a317a5bfc13e2df87fb63","reference":"https://thedfirreport.com","rule":"cobalt_strike_tmp01925d3f","score":"80","yarahub_license":"CC0 1.0","yarahub_reference_md5":"1c6ba04dc9808084846ac1005deb9c85","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"58ae3b15-154e-47e9-a24c-c8b885a4cd55"}}]},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"mnemonic_dns","type":"domain","description":"Mnemonic Secure DNS","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":null},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"https","addr":"files.catbox.moe/n8ow9e.dll","fqdn":"files.catbox.moe","domain":"catbox.moe","tld":"moe"},"ip":{"addr":"108.181.20.35","port":443,"asn":40676,"as":"AS40676","country":"United States","country_code":"US"},"is_navigation_request":true,"resource_type":"document","requested_by":"","date":"2024-11-29T18:38:17.327Z","timestamp":1732905497327,"http_version":"HTTP/2","security_state":"secure","security_info":{"cipher_suite":"TLS_AES_256_GCM_SHA384","key_group_name":"P384","signature_name":"ECDSA-P256-SHA256","protocol":"TLSv1.3","cert":{"subject":{"commonName":"catbox.moe","organization":""},"issuer":{"commonName":"E5","organization":"Let's Encrypt"},"validity":{"start":"Fri, 22 Nov 2024 23:56:02 GMT","end":"Thu, 20 Feb 2025 23:56:01 GMT"},"fingerprint":{"sha1":"77:74:D8:7D:C1:10:2D:04:86:7C:24:2A:52:40:A6:FB:A4:73:DE:A8","sha256":"2E:CF:07:78:4B:00:11:00:C8:88:D3:63:C1:97:54:35:74:3A:19:8B:22:10:49:5F:44:26:96:BB:D9:57:B1:E7"}}},"request":{"raw":"GET /n8ow9e.dll HTTP/1.1\r\nHost: files.catbox.moe\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate, br\r\nDNT: 1\r\nUpgrade-Insecure-Requests: 1\r\nConnection: keep-alive\r\nSec-Fetch-Dest: document\r\nSec-Fetch-Mode: navigate\r\nSec-Fetch-Site: cross-site\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/2 200 OK\r\nserver: nginx\r\ndate: Fri, 29 Nov 2024 18:38:17 GMT\r\ncontent-type: application/octet-stream\r\ncontent-length: 816640\r\nlast-modified: Thu, 18 Jul 2024 12:22:57 GMT\r\netag: \"66990921-c7600\"\r\nx-content-type-options: nosniff\r\ncontent-security-policy: default-src 'self' https://files.catbox.moe; style-src https://files.catbox.moe 'unsafe-inline'; img-src 'self' data:; font-src 'self'; media-src 'self'; object-src 'self';\r\naccess-control-allow-origin: *\r\naccess-control-allow-methods: GET, HEAD\r\naccept-ranges: bytes\r\nX-Firefox-Spdy: h2\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":816640,"size_decoded":816640,"mime_type":"application/octet-stream","magic":"PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections","md5":"7d13add48b8fddcd9c86879979aef481","sha1":"6777bb5bb7b0e43d0889b3b64884f8b60659195f","sha256":"640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","sha512":"1ad8196a42ed09fd90aa07f9628d68b4b09a9160aabd22edb3da9a16d93313bd93577c105739e4acc2edc55b659851fbc782158a7fc43c52f7222a014f4befa7","ssdeep":"24576:rCDAjCPps7W325iovvQAz7IDx1z7+Z0On2n/6UYT:SAjys7tNQJ/W2n/","tlshash":"67054b66a25e04e9e9676035415bbf8bd03b781a234167cfb3d605042fee3d076be389","first_seen":"2024-11-12T03:33:41.566011Z","last_seen":"2024-12-05T17:13:04.987077Z","times_seen":9,"resource_available":false,"data":null}},"time_used":2117,"timings":{"blocked":549,"dns":24,"connect":167,"send":0,"wait":166,"receive":853,"ssl":354},"alerts":{"ids":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"files - file ~tmp01925d3f.exe","trigger":"files.catbox.moe/n8ow9e.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"The DFIR Report","date":"2021-02-22","description":"files - file ~tmp01925d3f.exe","hash1":"10ff83629d727df428af1f57c524e1eaddeefd608c5a317a5bfc13e2df87fb63","reference":"https://thedfirreport.com","rule":"cobalt_strike_tmp01925d3f","score":"80","yarahub_license":"CC0 1.0","yarahub_reference_md5":"1c6ba04dc9808084846ac1005deb9c85","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"58ae3b15-154e-47e9-a24c-c8b885a4cd55"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2024-11-27","alert":"Scan result 54/71","trigger":"640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","verdict":"malicious","severity":"","comment":"malicious - 54/71","link":"https://www.virustotal.com/gui/file/640f5635ec9f5c1e9361b290448e3195d051d760ac3f6a42a368df53f25256aa","meta":null}],"urlquery":null}}]}
