Report Overview
- Visited public2025-02-04 12:52:58Tags
- URL
sw.lifeboxtransfer.com/v1/AUTH_LT_fc856d57-7abc-4ad2-ac90-950f9e675133/LT_e15b2bb6-98ca-4b2e-81a8-265e1e9ff651/f319a735-151f-4b75-9d5c-61592047649c/f319a735-151f-4b75-9d5c-61592047649c?temp_url_sig=ff78e71c9769e9ca41ff3a2b4d5de0574f1ed2d3c3cba5d29b85c901cb5a76ab&temp_url_expires=1738341974853&filename=lifebox+transfer-f319a735.zip
- Finishing URL
about:privatebrowsing
- IP / ASN
176.235.226.160
#34984 Superonline Iletisim Hizmetleri A.S.
Titleabout:privatebrowsing
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
sw.lifeboxtransfer.com | unknown | 2020-10-19 | 2022-06-06 | 2025-01-31 | 798 B | 261 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Timestamp | Severity | Source IP | Destination IP | Alert |
---|---|---|---|---|
2025-02-04 12:52:28 | low | Client IP | ![]() |
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
sw.lifeboxtransfer.com/v1/AUTH_LT_fc856d57-7abc-4ad2-ac90-950f9e675133/LT_e15b2bb6-98ca-4b2e-81a8-265e1e9ff651/f319a735-151f-4b75-9d5c-61592047649c/f319a735-151f-4b75-9d5c-61592047649c?temp_url_sig=ff78e71c9769e9ca41ff3a2b4d5de0574f1ed2d3c3cba5d29b85c901cb5a76ab&temp_url_expires=1738341974853&filename=lifebox+transfer-f319a735.zip
IP
176.235.226.160
ASN
#34984 Superonline Iletisim Hizmetleri A.S.
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
260 kB (260263 bytes)
Hash
c6e43187ab415f06e66e6d74ad39dae5
2a04f8defb35d71fc27cf964e0fac79f232be8a8
Archive (2)
Filename | Md5 | File type | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
DRAG ME IN THE INJECTOR.dll | c32e01ebaec0c994672b56bfa5410962
| PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections | |||||||||
senex-valo-injector.exe | d3af367eb793ee15aa368db650f94d37
| PE32+ executable (console) x86-64, for MS Windows, 6 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Mofongo loader maps and executes a payload in a hollowed msedge process |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |
---|---|---|---|---|
sw.lifeboxtransfer.com/v1/AUTH_LT_fc856d57-7abc-4ad2-ac90-950f9e675133/LT_e15b2bb6-98ca-4b2e-81a8-265e1e9ff651/f319a735-151f-4b75-9d5c-61592047649c/f319a735-151f-4b75-9d5c-61592047649c?temp_url_sig=ff78e71c9769e9ca41ff3a2b4d5de0574f1ed2d3c3cba5d29b85c901cb5a76ab&temp_url_expires=1738341974853&filename=lifebox+transfer-f319a735.zip | ![]() | 200 OK | 260 kB | |
HTTP Headers
| ||||