{"report_id":"dc35ef01-38ce-48cc-a9c9-62cbbe9aa83f","version":6,"status":"done","tags":[],"date":"2025-05-13T20:08:27Z","url":{"schema":"http","addr":"www.truly-random.com/truly_random.exe","fqdn":"www.truly-random.com","domain":"truly-random.com","tld":"com"},"ip":{"addr":"209.195.7.232","port":0,"asn":6597,"as":"COLOBLOX","country":"United States","country_code":"US"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"desktop","expires_at":"2027-07-22T20:08:27Z","useragent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"www.truly-random.com","ip":{"addr":"209.195.7.232","port":443,"asn":6597,"as":"COLOBLOX","country":"United States","country_code":"US"},"domain_registered":"2006-03-08","domain_rank":0,"first_seen":"2012-07-02T01:12:07Z","last_seen":"2025-04-26T00:58:21.93857Z","alert_count":2,"request_count":1,"received_data":1496887,"sent_data":505,"comment":"","tags":null,"fingerprints":null}],"files":[{"md5":"e9c4bb002d00e21644bf3171bca10a8e","sha1":"a32d8f8b6ebb394843e29b3a4b7ff8288771870d","sha256":"137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","sha512":"265250901790a39ccd20490fd89a904878892f0483b7cc0e4bd8cac1d235123286afb3815e6b48b067fe16eb38aab11993203f5c662f2dbcf86c465311ad7ec9","magic":"PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections","size":1496448,"url":{"schema":"https","addr":"www.truly-random.com/truly_random.exe","fqdn":"www.truly-random.com","domain":"truly-random.com","tld":"com"},"ip":{"addr":"209.195.7.232","port":443,"asn":6597,"as":"COLOBLOX","country":"United States","country_code":"US"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2025-05-13","alert":"Scans presence of the found strings using the in-house brute force method","trigger":"www.truly-random.com/truly_random.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"Byambaa@pubcert.mn","date":"2024-10-01","description":"Scans presence of the found strings using the in-house brute force method","rule":"ScanStringsInsocks5systemz","yarahub_license":"CC0 1.0","yarahub_reference_md5":"73875E9DA68182B09BC6A7FAAFFF67D8","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"cd061b79-9264-480a-bda6-2242046143d5"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-04-28","alert":"Scan result 1/72","trigger":"137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","verdict":"suspicious","severity":"","comment":"suspicious - 1/72","link":"https://www.virustotal.com/gui/file/137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","meta":null}]}}],"artifacts":{"windows_shortcuts":null,"files":[{"md5":"e9c4bb002d00e21644bf3171bca10a8e","sha1":"a32d8f8b6ebb394843e29b3a4b7ff8288771870d","sha256":"137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","sha512":"265250901790a39ccd20490fd89a904878892f0483b7cc0e4bd8cac1d235123286afb3815e6b48b067fe16eb38aab11993203f5c662f2dbcf86c465311ad7ec9","magic":"PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections","size":1496448,"url":{"schema":"https","addr":"www.truly-random.com/truly_random.exe","fqdn":"www.truly-random.com","domain":"truly-random.com","tld":"com"},"ip":{"addr":"209.195.7.232","port":443,"asn":6597,"as":"COLOBLOX","country":"United States","country_code":"US"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2025-05-13","alert":"Scans presence of the found strings using the in-house brute force method","trigger":"www.truly-random.com/truly_random.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"Byambaa@pubcert.mn","date":"2024-10-01","description":"Scans presence of the found strings using the in-house brute force method","rule":"ScanStringsInsocks5systemz","yarahub_license":"CC0 1.0","yarahub_reference_md5":"73875E9DA68182B09BC6A7FAAFFF67D8","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"cd061b79-9264-480a-bda6-2242046143d5"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-04-28","alert":"Scan result 1/72","trigger":"137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","verdict":"suspicious","severity":"","comment":"suspicious - 1/72","link":"https://www.virustotal.com/gui/file/137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","meta":null}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":null}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2025-05-13","alert":"Scans presence of the found strings using the in-house brute force method","trigger":"www.truly-random.com/truly_random.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"Byambaa@pubcert.mn","date":"2024-10-01","description":"Scans presence of the found strings using the in-house brute force method","rule":"ScanStringsInsocks5systemz","yarahub_license":"CC0 1.0","yarahub_reference_md5":"73875E9DA68182B09BC6A7FAAFFF67D8","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"cd061b79-9264-480a-bda6-2242046143d5"}}]},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":null},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"https","addr":"www.truly-random.com/truly_random.exe","fqdn":"www.truly-random.com","domain":"truly-random.com","tld":"com"},"ip":{"addr":"209.195.7.232","port":443,"asn":6597,"as":"COLOBLOX","country":"United States","country_code":"US"},"is_navigation_request":true,"resource_type":"","requested_by":"","date":"2025-05-13T20:07:55.266Z","timestamp":0,"http_version":"","security_state":"secure","security_info":{"cipher_suite":"TLS_AES_128_GCM_SHA256","key_group_name":"x25519","signature_name":"ECDSA-P384-SHA384","protocol":"TLSv1.3","cert":{"subject":{"commonName":"mail.truly-random.com","organization":""},"issuer":{"commonName":"E5","organization":"Let's Encrypt"},"validity":{"start":"Sun, 20 Apr 2025 21:42:29 GMT","end":"Sat, 19 Jul 2025 21:42:28 GMT"},"fingerprint":{"sha1":"5F:CA:B1:FD:85:27:6B:DA:75:69:FF:9D:45:80:F2:18:F3:B2:DC:6B","sha256":"C5:A5:62:6E:12:CE:48:1A:68:A5:D0:4D:95:B0:9D:42:9D:24:E3:EB:25:7F:14:67:1E:74:C7:42:8F:78:6A:C8"}}},"request":{"raw":"GET /truly_random.exe HTTP/1.1\r\nHost: www.truly-random.com\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate, br\r\nDNT: 1\r\nUpgrade-Insecure-Requests: 1\r\nConnection: keep-alive\r\nSec-Fetch-Dest: document\r\nSec-Fetch-Mode: navigate\r\nSec-Fetch-Site: cross-site\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/2 200 OK\r\netag: \"16d580-5446d90d-1c51eb;;;\"\r\nlast-modified: Tue, 21 Oct 2014 22:07:09 GMT\r\ncontent-type: application/x-executable\r\ncontent-length: 1496448\r\naccept-ranges: bytes\r\ndate: Tue, 13 May 2025 20:07:56 GMT\r\nserver: LiteSpeed\r\nalt-svc: h3=\":443\"; ma=2592000, h3-29=\":443\"; ma=2592000, h3-Q050=\":443\"; ma=2592000, h3-Q046=\":443\"; ma=2592000, h3-Q043=\":443\"; ma=2592000, quic=\":443\"; ma=2592000; v=\"43,46\"\r\nX-Firefox-Spdy: h2\r\n\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":1496448,"size_decoded":0,"mime_type":"application/x-executable","magic":"PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections","md5":"e9c4bb002d00e21644bf3171bca10a8e","sha1":"a32d8f8b6ebb394843e29b3a4b7ff8288771870d","sha256":"137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","sha512":"265250901790a39ccd20490fd89a904878892f0483b7cc0e4bd8cac1d235123286afb3815e6b48b067fe16eb38aab11993203f5c662f2dbcf86c465311ad7ec9","ssdeep":"24576:Z20qt778F3IFd6KM2qIGNxjpONgAEWlk5zHaer0BHhHfA6AONQkkCWRMFrODHqO8:Z23ttHjZGBtWlia40BJZ/kCWiODKj","tlshash":"05652346e2d4b27ee0d45a301ebaf1446bbfbe6179b4012571df4e0a47ab31cd06a31b","first_seen":"2023-05-04T19:47:12Z","last_seen":"2025-05-13T20:08:29.315078Z","times_seen":7,"resource_available":false,"data":null}},"time_used":2201,"timings":{"blocked":711,"dns":291,"connect":105,"send":0,"wait":108,"receive":671,"ssl":312},"alerts":{"ids":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2025-05-13","alert":"Scans presence of the found strings using the in-house brute force method","trigger":"www.truly-random.com/truly_random.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"Byambaa@pubcert.mn","date":"2024-10-01","description":"Scans presence of the found strings using the in-house brute force method","rule":"ScanStringsInsocks5systemz","yarahub_license":"CC0 1.0","yarahub_reference_md5":"73875E9DA68182B09BC6A7FAAFFF67D8","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"cd061b79-9264-480a-bda6-2242046143d5"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2025-04-28","alert":"Scan result 1/72","trigger":"137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","verdict":"suspicious","severity":"","comment":"suspicious - 1/72","link":"https://www.virustotal.com/gui/file/137f324bbdd9859d18b3a4ae71fe5af3241aeaaaa86c995c7bc4567a172507aa","meta":null}],"urlquery":null}}]}
