Report Overview

  1. Submitted URL

    eki.login.aocswd.monster/_AERO/AERO.zip

  2. IP

    198.46.251.179

    ASN

    #36352 AS-COLOCROSSING

  3. Submitted

    2023-03-31 06:59:12

    Access

    public

  4. Website Title

  5. Final URL

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
contile.services.mozilla.com11142021-05-27T20:32:35Z2023-03-31T18:12:09Z
push.services.mozilla.com21402014-10-24T10:27:06Z2023-03-31T18:13:52Z
eki.login.aocswd.monsterunknown2023-02-24T11:43:53Z2023-03-31T08:53:22Z
img-getpocket.cdn.mozilla.net16312018-06-22T01:36:00Z2023-03-31T07:51:33Z
r3.o.lencr.org3442020-12-02T09:52:13Z2023-03-31T18:12:04Z
firefox.settings.services.mozilla.com8672020-06-04T22:08:41Z2023-03-31T18:14:44Z
content-signature-2.cdn.mozilla.net11522020-11-03T13:26:46Z2023-03-31T18:18:04Z

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

OpenPhish

No alerts detected


PhishTank

No alerts detected


Fortinet's Web Filter
SeverityIndicatorAlert
mediumeki.login.aocswd.monster/_AERO/AERO.zipMalware

mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    eki.login.aocswd.monster/_AERO/AERO.zip

  2. IP

    198.46.251.179

  3. ASN

    #36352 AS-COLOCROSSING

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store\012- data

    Size

    769 kB (768640 bytes)

  2. Hash

    101023f0e54073b96252ef166de8d97b

    e7c35988a123285fbcc64c963b6749362b31dd72

    Detections

    AnalyzerVerdictAlert
    VirusTotal37/64

JavaScript (0)

HTTP Transactions (18)

URLIPResponseSize
r3.o.lencr.org/
23.36.76.226200 OK503 B
r3.o.lencr.org/
23.36.76.226200 OK503 B
firefox.settings.services.mozilla.com/v1/
35.241.9.150200 OK939 B
r3.o.lencr.org/
23.36.76.226200 OK503 B
content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-2023-04-30-16-53-14.chain
34.160.144.191200 OK5.3 kB
contile.services.mozilla.com/v1/tiles
34.117.237.239200 OK12 B
firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/cfr-v1-en-US
35.241.9.150200 OK329 B
r3.o.lencr.org/
23.36.76.226200 OK503 B
push.services.mozilla.com/
44.224.45.63101 Switching Protocols0 B
eki.login.aocswd.monster/_AERO/AERO.zip
198.46.251.179200 OK769 kB
r3.o.lencr.org/
23.36.76.226200 OK503 B
r3.o.lencr.org/
23.36.76.226200 OK503 B
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fba3e3682-3d0e-4ac1-8330-9ea9ebe92041.jpeg
34.120.237.76200 OK10 kB
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fe2f9b47f-7e28-468a-96d8-f92534ab813e.jpeg
34.120.237.76200 OK9.5 kB
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F2cbd721e-872e-4eec-8eb5-363663d0ab36.jpeg
34.120.237.76200 OK5.8 kB
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2Fa6350b4c-fa14-49e1-a21b-44b6f311dbdc.jpeg
34.120.237.76200 OK11 kB
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F36630e1b-1c89-4e55-ac67-f104436fd02c.jpeg
34.120.237.76200 OK8.4 kB
img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorpusapi-prod-images%2F067b6c49-6e52-4dcc-af72-f7292299f912.jpeg
34.120.237.76200 OK14 kB