IOC Report
https://leo.xlsir.click/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon May 27 21:35:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon May 27 21:35:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon May 27 21:35:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon May 27 21:35:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon May 27 21:35:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 136
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 137
Unicode text, UTF-8 text, with very long lines (65306)
downloaded
Chrome Cache Entry: 138
PNG image data, 683 x 349, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 139
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 140
ASCII text, with very long lines (12703), with CRLF line terminators
downloaded
Chrome Cache Entry: 141
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 142
PNG image data, 1549 x 312, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 143
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 144
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 145
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 146
PNG image data, 683 x 349, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 147
ASCII text
downloaded
Chrome Cache Entry: 148
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 149
ASCII text, with very long lines (65447)
downloaded
Chrome Cache Entry: 150
HTML document, Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 151
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 152
PNG image data, 1549 x 312, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 153
HTML document, ASCII text, with CRLF line terminators
downloaded
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 --field-trial-handle=2292,i,15258614850153021175,15050691775530523032,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://leo.xlsir.click/"

URLs

Name
IP
Malicious
https://leo.xlsir.click/
malicious
https://leo.xlsir.click/
malicious
https://leo.xlsir.click/home.php
malicious
https://cdn.jsdelivr.net/npm/bootstrap
unknown
https://a.nel.cloudflare.com/report/v4?s=WZOAJGekKSXVt8VxcIJwJZ7wI7ApqgCnVBG4TNsV7%2F3ZqmZVLIS%2FsZT9TejGL72tcgE6WgUqgICNMTEITta9QAZziTASh3SVfKCZJj6xrvc5Hy1Cq8%2BW8itpeBe93qej7nA%3D
35.190.80.1
https://res.cloudinary.com/ductham087/image/upload/v1694658537/mlipp554tgpfzfa4o3zy.jpg
unknown
https://static.xx.fbcdn.net/rsrc.php/yb/r/hLRJ1GG_y0J.ico
157.240.252.13
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css
151.101.193.229
https://leo.xlsir.click/images/logo.meta.png
172.67.156.167
https://leo.xlsir.click/static/media/background.1f85623d06212e6d3ed4.png
172.67.156.167
https://leo.xlsir.click/images/banner1.png
172.67.156.167
https://leo.xlsir.click/static/js/main.a3de5fef.js
172.67.156.167
https://getbootstrap.com/)
unknown
https://leo.xlsir.click/meta-community-standard/buiness
https://leo.xlsir.click/css/main.02.css
172.67.156.167
https://leo.xlsir.click/favicon.ico
172.67.156.167
https://leo.xlsir.click/images%20/logo.meta.png
172.67.156.167
https://code.jquery.com/jquery-3.7.1.min.js
151.101.194.137
https://a.nel.cloudflare.com/report/v4?s=jP4Hd2WL5VhQSliYuQcDDcsEQXCJZcU1iXQSbM950zhrETJ%2BJQCtpAf0PJ69mFnue5n6zFpvBUc9Y1jBvckzi9%2BgBxCHweDiqmf1w6jkRviPC%2BN1nTDmMDYeD40vvIqzs1c%3D
35.190.80.1
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jsdelivr.map.fastly.net
151.101.193.229
scontent.xx.fbcdn.net
157.240.252.13
a.nel.cloudflare.com
35.190.80.1
code.jquery.com
151.101.194.137
www.google.com
142.250.184.196
leo.xlsir.click
172.67.156.167
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
87.248.205.0
cdn.jsdelivr.net
unknown
56.126.166.20.in-addr.arpa
unknown
static.xx.fbcdn.net
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.184.196
www.google.com
United States
142.250.185.68
unknown
United States
151.101.193.229
jsdelivr.map.fastly.net
United States
104.21.90.128
unknown
United States
192.168.2.4
unknown
unknown
192.168.2.5
unknown
unknown
157.240.251.9
unknown
United States
239.255.255.250
unknown
Reserved
172.67.156.167
leo.xlsir.click
United States
151.101.194.137
code.jquery.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
157.240.252.13
scontent.xx.fbcdn.net
United States
There are 2 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://leo.xlsir.click/
https://leo.xlsir.click/home.php
https://leo.xlsir.click/meta-community-standard/buiness