IOC Report
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/authenticate.html?onlinebanking.mtb.com/Login/MTBSignOn

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 44
Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
downloaded
Chrome Cache Entry: 45
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 46
PNG image data, 300 x 300, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 47
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 48
Web Open Font Format, TrueType, length 64318, version 1.0
downloaded
Chrome Cache Entry: 49
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 50
Web Open Font Format, TrueType, length 67671, version 1.0
downloaded
Chrome Cache Entry: 51
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 52
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 53
Web Open Font Format, TrueType, length 4776, version 1.0
downloaded
Chrome Cache Entry: 54
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 55
PNG image data, 300 x 300, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 56
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 57
SVG Scalable Vector Graphics image
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 --field-trial-handle=2180,i,4538153266985756418,1836816677918798091,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/authenticate.html?onlinebanking.mtb.com/Login/MTBSignOn"

URLs

Name
IP
Malicious
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/authenticate.html?onlinebanking.mtb.com/Login/MTBSignOn
malicious
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/authenticate.html?onlinebanking.mtb.com/Login/MTBSignOn
malicious
https://resources.mtb.com/assets/fonts/mandtbaltoweb-book.woff
192.216.61.78
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/favicon.ico
163.44.198.51
https://resources.mtb.com/assets/fonts/mandtpg-iconfont.woff
192.216.61.78
https://resources.mtb.com/assets/fonts/mandtbaltoweb-medium.woff
192.216.61.78
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/css.css
163.44.198.51
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/mtb-logo.svg
163.44.198.51
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/mtb-equalhousinglender.svg
163.44.198.51
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/img/mtb-entrust.svg
163.44.198.51

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
46814880-10-20181030130048.webstarterz.com
163.44.198.51
www.google.com
216.58.206.68
resources.gslb.mtb.com
192.216.61.78
fp2e7a.wpc.phicdn.net
192.229.221.95
resources.mtb.com
unknown

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
163.44.198.51
46814880-10-20181030130048.webstarterz.com
Singapore
192.216.61.78
resources.gslb.mtb.com
United States
192.168.2.6
unknown
unknown
216.58.206.68
www.google.com
United States
192.168.2.5
unknown
unknown

DOM / HTML

URL
Malicious
http://46814880-10-20181030130048.webstarterz.com/tedsplay.com/onlinebankingmtb/authenticate.html?onlinebanking.mtb.com/Login/MTBSignOn