Report Overview

  1. Submitted URL

    chan7ee.tistory.com/attachment/cfile29.uf@1322ED364D4365E32FCE35.zip

  2. IP

    27.0.236.143

    ASN

    #38099 Kakao Corp

  3. Submitted

    2024-04-27 04:12:58

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
chan7ee.tistory.comunknown2005-10-012017-07-052024-03-12
t1.daumcdn.net202392010-07-082014-10-062024-04-26

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    t1.daumcdn.net/cfile/tistory/1322ED364D4365E32F?download

  2. IP

    23.36.76.233

  3. ASN

    #20940 Akamai International B.V.

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    245 kB (245411 bytes)

  2. Hash

    f90b0e30c0bd15279210f6d0e33a4c48

    7aafdf9e5724de529d0f773448bfd01953954a65

  1. Archive (1)

  2. FilenameMd5File type
    superscan.exe
    0071813eb4668769a15fcd2d1ca1686d
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, InstallShield self-extracting archive, 3 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Disclosed hacktool set (old stuff) - file superscan3.0.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
chan7ee.tistory.com/attachment/cfile29.uf@1322ED364D4365E32FCE35.zip
27.0.236.143302 Found0 B
t1.daumcdn.net/cfile/tistory/1322ED364D4365E32F?download
23.36.76.233200 OK245 kB