Report Overview

  1. Submitted URL

    sgahlen.de/.cm4all/uproc.php/0/Downloads/LuPo/LuPO_NRW_SV.exe?_=168707a1ac8&cdp=a

  2. IP

    81.169.145.143

    ASN

    #6724 Strato AG

  3. Submitted

    2024-04-27 00:13:34

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
sgahlen.deunknownunknown2019-03-072023-04-03

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumsgahlen.de/.cm4all/uproc.php/0/Downloads/LuPo/LuPO_NRW_SV.exe?_=168707a1ac8&cdp=ameth_get_eip
mediumsgahlen.de/.cm4all/uproc.php/0/Downloads/LuPo/LuPO_NRW_SV.exe?_=168707a1ac8&cdp=aIdentifies Office documents created by a cracked Office version, SPecialiST RePack.

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    sgahlen.de/.cm4all/uproc.php/0/Downloads/LuPo/LuPO_NRW_SV.exe?_=168707a1ac8&cdp=a

  2. IP

    81.169.145.143

  3. ASN

    #6724 Strato AG

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections

    Size

    11 MB (11369680 bytes)

  2. Hash

    0b4b6184fdd5515c506b51d4bb0a2b3e

    cd9dbb2b76783eb1e50ff3123b026677cbe0c894

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    Public InfoSec YARA rulesmalware
    Identifies Office documents created by a cracked Office version, SPecialiST RePack.

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
sgahlen.de/.cm4all/uproc.php/0/Downloads/LuPo/LuPO_NRW_SV.exe?_=168707a1ac8&cdp=a
81.169.145.143200 OK11 MB