Report Overview

  1. Submitted URL

    cdn.discordapp.com/attachments/1234694997266399264/1235410599194923018/BlockTheSpot-master.zip?ex=66363f87&is=6634ee07&hm=7db60cc36c099d6b1efeb85e187d0356684c56488e994da761dab7fa2e440bb3&

  2. IP

    162.159.130.233

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-05-03 20:39:41

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242024-05-02

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1234694997266399264/1235410599194923018/BlockTheSpot-master.zip?ex=66363f87&is=6634ee07&hm=7db60cc36c099d6b1efeb85e187d0356684c56488e994da761dab7fa2e440bb3&

  2. IP

    162.159.133.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    398 kB (397996 bytes)

  2. Hash

    8819822c97e8c711d2520f2fa0872c83

    3420d598b47f1be2f84a52f45c6a718cb81ce5c3

  1. Archive (24)

  2. FilenameMd5File type
    bug_report.md
    0cca0aa82d26523ac1eff3f59ecc4270
    ASCII text
    LICENSE
    b6f9960b5bbaa2cfc4553bfe266d5486
    ASCII text
    README.md
    e8a6963bc3571862c8402c433c196ad8
    ASCII text
    downgrade.bat
    e1c1b01bc33b17f01a3bdd84cceb459f
    data
    install.bat
    2080fc685222b511643d34d9b1c7f8cb
    data
    netutils.dll
    301efd794940d799a9b67575ddf9e414
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 6 sections
    BlockTheSpot.cpp
    30b747a0fac3d0c1d28a904ccae4ea17
    C source, ASCII text
    BlockTheSpot.vcxproj
    3f65c285a46359fa9c1c0d4d2511c4bc
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text
    cpu.c
    ce6373cbd7e83a2865198dc4ea61cc38
    C source, ASCII text
    cpu.h
    035820a4a9b347bcd8a7ae20d0289376
    C source, ASCII text
    disasm.c
    f60e3fdf1c5f0055718695ea06ae3d74
    C source, ASCII text
    disasm.h
    bac55bef885643684fb41b7e85eda807
    C source, ASCII text
    disasm_x86.c
    b617968f2b59da214a5a12f8a92d5ca5
    C source, ASCII text
    disasm_x86.h
    8a33a338a2e1a780648148eda2fc371d
    C source, ASCII text
    disasm_x86_tables.h
    0bfee35dd136aa197deb903dfdbbb166
    C source, ASCII text, with very long lines (516)
    misc.c
    71bcbd1adf2f190e5653f107a61a6f98
    C source, ASCII text
    misc.h
    9e7aee74f459eec9c512883587b60001
    C source, ASCII text
    dllmain.cpp
    35a0b14ab0fd5b4fc3a712390082ad7c
    C source, ASCII text
    hosts.h
    f413cc12f002d86a7b3c6ae3f5ea9104
    C source, ASCII text
    mhook.cpp
    25042a39176df1cfb1f019fa71db8214
    C source, ASCII text
    mhook.h
    58e247d21d168180241b2445b8a24262
    C source, ASCII text
    stdafx.cpp
    2988ce1a9d4c70b0b9ad2450e87e3e79
    C source, ASCII text
    stdafx.h
    4f23797f6efbaeb5c4578cf0ea4617b6
    C source, ASCII text
    targetver.h
    0ee32c85c7df3fe7aa3c858478b0555c
    C source, ASCII text

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious PowerShell code that downloads from web sites
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1234694997266399264/1235410599194923018/BlockTheSpot-master.zip?ex=66363f87&is=6634ee07&hm=7db60cc36c099d6b1efeb85e187d0356684c56488e994da761dab7fa2e440bb3&
162.159.133.233200 OK398 kB