Report Overview

  1. Visited public
    2025-02-04 12:52:58
    Tags
  2. URL

    sw.lifeboxtransfer.com/v1/AUTH_LT_fc856d57-7abc-4ad2-ac90-950f9e675133/LT_e15b2bb6-98ca-4b2e-81a8-265e1e9ff651/f319a735-151f-4b75-9d5c-61592047649c/f319a735-151f-4b75-9d5c-61592047649c?temp_url_sig=ff78e71c9769e9ca41ff3a2b4d5de0574f1ed2d3c3cba5d29b85c901cb5a76ab&temp_url_expires=1738341974853&filename=lifebox+transfer-f319a735.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    176.235.226.160

    #34984 Superonline Iletisim Hizmetleri A.S.

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
1
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
sw.lifeboxtransfer.comunknown2020-10-192022-06-062025-01-31

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP 176.235.226.160

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    sw.lifeboxtransfer.com/v1/AUTH_LT_fc856d57-7abc-4ad2-ac90-950f9e675133/LT_e15b2bb6-98ca-4b2e-81a8-265e1e9ff651/f319a735-151f-4b75-9d5c-61592047649c/f319a735-151f-4b75-9d5c-61592047649c?temp_url_sig=ff78e71c9769e9ca41ff3a2b4d5de0574f1ed2d3c3cba5d29b85c901cb5a76ab&temp_url_expires=1738341974853&filename=lifebox+transfer-f319a735.zip

  2. IP

    176.235.226.160

  3. ASN

    #34984 Superonline Iletisim Hizmetleri A.S.

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    260 kB (260263 bytes)

  2. Hash

    c6e43187ab415f06e66e6d74ad39dae5

    2a04f8defb35d71fc27cf964e0fac79f232be8a8

  1. Archive (2)

  2. FilenameMd5File type
    DRAG ME IN THE INJECTOR.dll
    c32e01ebaec0c994672b56bfa5410962
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
    senex-valo-injector.exe
    d3af367eb793ee15aa368db650f94d37
    PE32+ executable (console) x86-64, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    Mofongo loader maps and executes a payload in a hollowed msedge process

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
sw.lifeboxtransfer.com/v1/AUTH_LT_fc856d57-7abc-4ad2-ac90-950f9e675133/LT_e15b2bb6-98ca-4b2e-81a8-265e1e9ff651/f319a735-151f-4b75-9d5c-61592047649c/f319a735-151f-4b75-9d5c-61592047649c?temp_url_sig=ff78e71c9769e9ca41ff3a2b4d5de0574f1ed2d3c3cba5d29b85c901cb5a76ab&temp_url_expires=1738341974853&filename=lifebox+transfer-f319a735.zip
176.235.226.160200 OK260 kB