Report Overview

  1. Visited public
    2024-10-24 01:34:58
    Tags
  2. URL

    prod-guanabara-frontoffice-smartbus.oreons.com/SmartBus.Client.Setup.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    189.39.40.208

    #16735 ALGAR TELECOM SA

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
prod-guanabara-frontoffice-smartbus.oreons.comunknown2015-07-212023-01-022023-12-01

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumprod-guanabara-frontoffice-smartbus.oreons.com/SmartBus.Client.Setup.exeDetects an SFX archive with automatic script execution
mediumprod-guanabara-frontoffice-smartbus.oreons.com/SmartBus.Client.Setup.exefiles - file ~tmp01925d3f.exe
mediumprod-guanabara-frontoffice-smartbus.oreons.com/SmartBus.Client.Setup.exepe_detect_tls_callbacks

OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    prod-guanabara-frontoffice-smartbus.oreons.com/SmartBus.Client.Setup.exe

  2. IP

    189.39.40.208

  3. ASN

    #16735 ALGAR TELECOM SA

  1. File type

    PE32+ executable (GUI) x86-64, for MS Windows, 8 sections

    Size

    776 kB (776184 bytes)

  2. Hash

    b556390d95c240664c267bb4685eaf6c

    9134f8962076d907a899038d9f475f962c3e4bfa

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detects an SFX archive with automatic script execution
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
prod-guanabara-frontoffice-smartbus.oreons.com/SmartBus.Client.Setup.exe
189.39.40.208200 OK776 kB