| dlqsclub.com/wp-content/uploads/8ST56kZvvQ/ | 0.0.0.0 | | 0 B |
URL User Request GET dlqsclub.com/wp-content/uploads/8ST56kZvvQ/ IP 0.0.0.0:0
Hashd41d8cd98f00b204e9800998ecf8427e da39a3ee5e6b4b0d3255bfef95601890afd80709 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Analyzer | Verdict | Alert | mnemonic secure dns | malicious | Sinkholed | Quad9 DNS | malicious | Sinkholed |
NIDS | Severity | Alert | suricata | high | URLhaus Known malware download URL detected (2108135) | suricata | high | ET POLICY PE EXE or DLL Windows file download HTTP | suricata | high | ETPRO MALWARE Emotet Payload Inbound (2023-03-16) | suricata | low | ET INFO EXE - Served Attached HTTP |
GET /wp-content/uploads/8ST56kZvvQ/ HTTP/1.1
Host: dlqsclub.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.8.1
Date: Tue, 14 Nov 2023 08:02:03 GMT
Content-Type: application/x-msdownload
Content-Length: 782336
Connection: keep-alive
X-Powered-By: PHP/7.1.31
Set-Cookie: 6553297bc7140=1699948923; expires=Tue, 14-Nov-2023 08:03:03 GMT; Max-Age=60; path=/
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Tue, 14 Nov 2023 08:02:03 GMT
Expires: Tue, 14 Nov 2023 08:02:03 GMT
Content-Disposition: attachment; filename="oBf3YfDoeM0sw6VtKqPrLiOdrmYzrqL5Hs.dll"
Content-Transfer-Encoding: binary
|
| dlqsclub.com/wp-content/uploads/8ST56kZvvQ/ | 0.0.0.0 | | 0 B |
URL User Request GET dlqsclub.com/wp-content/uploads/8ST56kZvvQ/ IP 0.0.0.0:0
Hashd41d8cd98f00b204e9800998ecf8427e da39a3ee5e6b4b0d3255bfef95601890afd80709 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Analyzer | Verdict | Alert | mnemonic secure dns | malicious | Sinkholed | Quad9 DNS | malicious | Sinkholed |
NIDS | Severity | Alert | suricata | high | URLhaus Known malware download URL detected (2108135) | suricata | high | ET POLICY PE EXE or DLL Windows file download HTTP | suricata | high | ETPRO MALWARE Emotet Payload Inbound (2023-03-16) | suricata | low | ET INFO EXE - Served Attached HTTP |
GET /wp-content/uploads/8ST56kZvvQ/ HTTP/1.1
Host: dlqsclub.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
|