IOC Report
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 108
Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
downloaded
Chrome Cache Entry: 109
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 110
PNG image data, 300 x 300, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 111
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 112
Web Open Font Format, TrueType, length 64318, version 1.0
downloaded
Chrome Cache Entry: 113
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 114
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 115
Web Open Font Format, TrueType, length 67671, version 1.0
downloaded
Chrome Cache Entry: 116
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 117
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 118
Web Open Font Format, TrueType, length 4776, version 1.0
downloaded
Chrome Cache Entry: 119
PNG image data, 300 x 300, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 120
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 121
SVG Scalable Vector Graphics image
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1984,i,2315323049855643941,11588584059325083261,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/"

URLs

Name
IP
Malicious
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/
malicious
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/
malicious
https://resources.mtb.com/assets/fonts/mandtbaltoweb-book.woff
24.75.29.77
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/favicon.ico
163.44.198.51
https://resources.mtb.com/assets/fonts/mandtpg-iconfont.woff
24.75.29.77
https://resources.mtb.com/assets/fonts/mandtbaltoweb-medium.woff
24.75.29.77
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/css.css
163.44.198.51
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/mtb-logo.svg
163.44.198.51
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/mtb-equalhousinglender.svg
163.44.198.51
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/mtb-entrust.svg
163.44.198.51

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
46814880-10-20181030130048.webstarterz.com
163.44.198.51
www.google.com
142.250.186.100
resources.gslb.mtb.com
24.75.29.77
fp2e7a.wpc.phicdn.net
192.229.221.95
resources.mtb.com
unknown

IPs

IP
Domain
Country
Malicious
163.44.198.51
46814880-10-20181030130048.webstarterz.com
Singapore
24.75.29.77
resources.gslb.mtb.com
United States
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.186.100
www.google.com
United States

DOM / HTML

URL
Malicious
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/