Windows
Analysis Report
https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneN
Overview
General Information
Detection
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 7072 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// link.mail. beehiiv.co m/ls/click ?upn=u001. fl7hrKpqiw 6rleMq0yET nMUZuFsAAw CeO-2BH5ER PYbcqsWCpx HbnR-2BAMn i5gDH0KguW znuzJ8-2BP LnfO8gj2j9 yQl2ivfAsJ Y4Ezg7DDw3 zzKfSzxTK3 e4dxMSvOfB S7t3jD7uyM daZpLpYA-2 FoIuXpkYxx l3nOzWBw62 nOLKDtQmnH prAllAUT7J IYUOdWTCNc 6huay-2BA- 2FIfT2dnkF c6AmqA-3D- 3DxUjQ_ALl q5-2F4R3mn eNPhLNwp-2 FSklL98Rff w61E2phJyJ wq6p9ZGyzx Gn1cEvL1cS -2FpYXg8QF 3LQcVH6N3N vQgDELZv6i F7S8jW1KUD Mp8-2BQMtN l9tkzcJNyX 8lQ8goJivR SJ1rRDtRrM prAouHGu5b lxfALgR7Dy 3RcUTkIa9P 9fzPowjq9z zgdGTCyOFs 7uFwdqBdbR A0dgNynR-2 B7yAoxS-2F BqGA-2F5DU Ot7N3ksCGS piDeOafLSS GRb3lCM-2F ejLKZB1caB q-2BVS77p1 9cSK7ce7MM CKsUbNJM3W jT5y2hIW-2 BU2KRnVsBR KjayQIu3Eo egvuf-2F4- 2BO5eZgRdF ML9H6U59Sx yK76FhpMNa -2FGiv4uFw sBB2sysmbv 0-2Frx-2Bn QQJumR5LaN VWmqB2NU4e pM800AHR8Y JC4DZjZx1F vHMAKtZua3 5bl6MvjANz HsLEoDCNLF V06pC#bGFp bmkuc2NodW x0ekBnb2Fh Lm9yZw== MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 828 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2224 --fi eld-trial- handle=195 6,i,102347 8061488769 3068,13232 5162287696 84327,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6552 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= audio.mojo m.AudioSer vice --lan g=en-US -- service-sa ndbox-type =audio --m ojo-platfo rm-channel -handle=43 64 --field -trial-han dle=1956,i ,102347806 1488769306 8,13232516 2287696843 27,262144 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionHintsFe tching,Opt imizationT argetPredi ction /pre fetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Phisher_2 | Yara detected Phisher | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_54 | Yara detected HtmlPhish_54 | Joe Security | ||
JoeSecurity_HtmlPhish_54 | Yara detected HtmlPhish_54 | Joe Security | ||
JoeSecurity_HtmlPhish_54 | Yara detected HtmlPhish_54 | Joe Security | ||
JoeSecurity_HtmlPhish_54 | Yara detected HtmlPhish_54 | Joe Security | ||
JoeSecurity_HtmlPhish_54 | Yara detected HtmlPhish_54 | Joe Security | ||
Click to see the 4 entries |
Timestamp: | 06/06/24-16:13:41.089038 |
SID: | 2857090 |
Source Port: | 443 |
Destination Port: | 49714 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Phishing |
---|
Source: | LLM: | ||
Source: | LLM: | ||
Source: | LLM: |
Source: | Matcher: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: |
Source: | Matcher: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Snort IDS: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Drive-by Compromise | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
1e1f038a-c32a1353.signedfiless.com | 45.95.169.133 | true | true | unknown | |
fe63ee9f-c32a1353.signedfiless.com | 45.95.169.133 | true | true | unknown | |
acf7658e-c32a1353.signedfiless.com | 45.95.169.133 | true | true | unknown | |
doxcs.signedfiless.com | 45.95.169.133 | true | true | unknown | |
787bf5fe-c32a1353.signedfiless.com | 45.95.169.133 | true | true | unknown | |
mwtelhasecologicas.com.br | 128.201.75.108 | true | false | unknown | |
link.mail.beehiiv.com | 104.18.68.40 | true | false | unknown | |
cc89e54c-c32a1353.signedfiless.com | 45.95.169.133 | true | true | unknown | |
www.google.com | 142.250.186.68 | true | false | unknown | |
1c91e9fc-c32a1353.signedfiless.com | 45.95.169.133 | true | true | unknown | |
l1ve.signedfiless.com | 45.95.169.133 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
false | unknown | ||
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.186.68 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.186.78 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
128.201.75.108 | mwtelhasecologicas.com.br | Brazil | 266618 | MEGAPROVEDOR-SERVICOSDEINTERNETLTDA-MEBR | false | |
172.217.16.138 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.238 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
45.95.169.133 | 1e1f038a-c32a1353.signedfiless.com | Croatia (LOCAL Name: Hrvatska) | 42864 | GIGANET-HUGigaNetInternetServiceProviderCoHU | true | |
142.250.185.131 | unknown | United States | 15169 | GOOGLEUS | false | |
64.233.184.84 | unknown | United States | 15169 | GOOGLEUS | false | |
104.18.68.40 | link.mail.beehiiv.com | United States | 13335 | CLOUDFLARENETUS | false | |
172.217.16.195 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1453063 |
Start date and time: | 2024-06-06 16:13:04 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneNPhLNwp-2FSklL98Rffw61E2phJyJwq6p9ZGyzxGn1cEvL1cS-2FpYXg8QF3LQcVH6N3NvQgDELZv6iF7S8jW1KUDMp8-2BQMtNl9tkzcJNyX8lQ8goJivRSJ1rRDtRrMprAouHGu5blxfALgR7Dy3RcUTkIa9P9fzPowjq9zzgdGTCyOFs7uFwdqBdbRA0dgNynR-2B7yAoxS-2FBqGA-2F5DUOt7N3ksCGSpiDeOafLSSGRb3lCM-2FejLKZB1caBq-2BVS77p19cSK7ce7MMCKsUbNJM3WjT5y2hIW-2BU2KRnVsBRKjayQIu3Eoegvuf-2F4-2BO5eZgRdFML9H6U59SxyK76FhpMNa-2FGiv4uFwsBB2sysmbv0-2Frx-2BnQQJumR5LaNVWmqB2NU4epM800AHR8YJC4DZjZx1FvHMAKtZua35bl6MvjANzHsLEoDCNLFV06pC#bGFpbmkuc2NodWx0ekBnb2FhLm9yZw== |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal84.phis.win@18/24@26/127 |
- Exclude process from analysis (whitelisted): svchost.exe
- Excluded IPs from analysis (whitelisted): 64.233.184.84, 172.217.16.195, 142.250.185.238, 34.104.35.123
- Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneNPhLNwp-2FSklL98Rffw61E2phJyJwq6p9ZGyzxGn1cEvL1cS-2FpYXg8QF3LQcVH6N3NvQgDELZv6iF7S8jW1KUDMp8-2BQMtNl9tkzcJNyX8lQ8goJivRSJ1rRDtRrMprAouHGu5blxfALgR7Dy3RcUTkIa9P9fzPowjq9zzgdGTCyOFs7uFwdqBdbRA0dgNynR-2B7yAoxS-2FBqGA-2F5DUOt7N3ksCGSpiDeOafLSSGRb3lCM-2FejLKZB1caBq-2BVS77p19cSK7ce7MMCKsUbNJM3WjT5y2hIW-2BU2KRnVsBRKjayQIu3Eoegvuf-2F4-2BO5eZgRdFML9H6U59SxyK76FhpMNa-2FGiv4uFwsBB2sysmbv0-2Frx-2BnQQJumR5LaNVWmqB2NU4epM800AHR8YJC4DZjZx1FvHMAKtZua35bl6MvjANzHsLEoDCNLFV06pC#bGFpbmkuc2NodWx0ekBnb2FhLm9yZw==
Input | Output |
---|---|
URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct | { "riskscore": 2, "reasons": "The code defines several functions but does not contain any suspicious behavior such as redirecting to phishing sites, tracking users, or creating advertisements. However, it is worth noting that the code contains complex structures and uses of Promises and generators which could potentially hide malicious behavior. Therefore, a risk score of 2 is assigned." } ) |
!function(){"use strict";var t=function(r,e){return t=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(t,r){t.__proto__=r}||function(t,r){for(var e in r)Object.prototype.hasOwnProperty.call(r,e)&&(t[e]=r[e])},t(r,e)};function r(r,e){if("function"!=typeof e&&null!==e)throw new TypeError("Class extends value "+String(e)+" is not a constructor or null");function n(){this.constructor=r}t(r,e),r.prototype=null===e?Object.create(e):(n.prototype=e.prototype,new n)}function e(t,r,e,n){return new(e||(e=Promise))((function(o,i){function u(t){try{s(n.next(t))}catch(t){i(t)}}function c(t){try{s(n.throw(t))}catch(t){i(t)}}function s(t){var r;t.done?o(t.value):(r=t.value,r instanceof e?r:new e((function(t){t(r)}))).then(u,c)}s((n=n.apply(t,r||[])).next())}))}function n(t,r){var e,n,o,i,u={label:0,sent:function(){if(1&o[0])throw o[1];return o[1]},trys:[],ops:[]};return i={next:c(0),throw:c(1),return:c(2)},"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function c(c){return function(s){return function(c){if(e)throw new TypeError("Generator is already executing.");for(;i&&(i=0,c[0]&&(u=0)),u;)try{if(e=1,n&&(o=2&c[0]?n.return:c[0]?n.throw||((o=n.return)&&o.call(n),0):n.next)&&!(o=o.call(n,c[1])).done)return o;switch(n=0,o&&(c=[2&c[0],o.value]),c[0]){case 0:case 1:o=c;break;case 4:return u.label++,{value:c[1],done:!1};case 5:u.label++,n=c[1],c=[0];continue;case 7:c=u.ops.pop(),u.trys.pop();continue;default:if(!(o=u.trys,(o=o.length>0&&o[o.length-1])||6!==c[0]&&2!==c[0])){u=0;continue}if(3===c[0]&&(!o||c[1]>o[0]&&c[1]<o[3])){u.label=c[1];break}if(6===c[0]&&u.label<o[1]){u.label=o[1],o=c;break}if(o&&u.label<o[2]){u.label=o[2],u.ops.push(c);break}o[2]&&u.ops.pop(),u.trys.pop();continue}c=r.call(t,u)}catch(t){c=[6,t],n=0}finally{e=o=0}if(5&c[0])throw c[1];return{value:c[0]?c[1]:void 0,done:!0}}([c,s])}}}Object.create;function o(t){var r="function"==typeof Symbol&&Symbol.iterator,e=r&&t[r],n=0;if(e)return e.call(t);if(t&&"number"==typeof t.length)return{next:function(){return t&&n>=t.length&&(t=void 0),{value:t&&t[n++],done:!t}}};throw new TypeError(r?"Object is not iterable.":"Symbol.iterator is not defined.")}function i(t,r){var e="function"==typeof Symbol&&t[Symbol.iterator];if(!e)return t;var n,o,i=e.call(t),u=[];try{for(;(void 0===r||r-- >0)&&!(n=i.next()).done;)u.push(n.value)}catch(t){o={error:t}}finally{try{n&&!n.done&&(e=i.return)&&e.call(i)}finally{if(o)throw o.error}}return u}function u(t,r,e){if(e||2===arguments.length)for(var n,o=0,i=r.length;o<i;o++)!n&&o in r||(n||(n=Array.prototype.slice.call(r,0,o)),n[o]=r[o]);return t.concat(n||Array.prototype.slice.call(r))}function c(t){return this instanceof c?(this.v=t,this):new c(t)}function s(t,r,e){if(!Symbol.asyncIterator)throw new TypeError("Symbol.asyncIterator is not defined.");var n,o=e.apply(t,r||[]),i=[];return n={},u("next"),u("throw"),u("return"),n[Symbol.asyncIterator]=function(){return this},n;function u(t){o[t]&&(n[t]=function(r){return new Promise((function(e | |
URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct | ```json { "riskscore": 1, "reasons": "The code attempts to modify the top-level frame's location by appending a session ID. This could be a potential risk if the session ID is sensitive or user-specific. However, the impact is low since it is a common practice for tracking user activities and does not involve any suspicious redirections or phishing attempts." } |
//<![CDATA[ !function(){var e=window,s=e.document,i=e.$Config||{};if(true){s&&s.body&&(s.body.style.display="block")}else if(false){var o,t,r,f,n,d;if(i.fAddTryCatchForIFrameRedirects){try{o=e.self.location.href,t=o.indexOf("#"),r=-1!==t,f=o.indexOf("?"),n=r?t:o.length,d=-1===f||r&&f>t?"?":"&",o=o.substr(0,n)+d+"iframe-request-id="+i.sessionId+o.substr(n),e.top.location=o}catch(e){}}else{o=e.self.location.href,t=o.indexOf("#"),r=-1!==t,f=o.indexOf("?"),n=r?t:o.length,d=-1===f||r&&f>t?"?":"&", o=o.substr(0,n)+d+"iframe-request-id="+i.sessionId+o.substr(n),e.top.location=o}}}(); // | |
URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct | ```json { "riskscore": 1, "reasons": "The code creates an anonymous function that listens for 'error' and 'load' events on elements in the head of the document. While this in itself is not malicious, it is often used for loading resources from external sources (e.g. a CDN), which can introduce security risks if the external source is compromised. However, in this specific case, there is no evidence of phishing or other malicious intent, so the risk score is kept low." } |
//<![CDATA[ !function(t,e){!function(){var n=e.getElementsByTagName("head")[0];n&&n.addEventListener&&(n.addEventListener("error",function(e){null!==e.target&&"cdn"===e.target.getAttribute("data-loader")&&t.$Loader.OnError(e.target)},!0),n.addEventListener("load",function(e){null!==e.target&&"cdn"===e.target.getAttribute("data-loader")&&t.$Loader.OnSuccess(e.target)},!0))}()}(window,document); // | |
URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct | { "riskscore": 5, "reasons": "The code contains obfuscated variable and function names, which can be indicative of malicious intent. However, it does not contain any obvious redirections, tracking, or advertisement-related behavior. The code also does not contain any long random hexadecimal strings. The risk score is therefore set to 5, indicating a moderate level of suspicion." } Explanation: While the code does not contain any overtly malicious behavior, the use of obfuscated variable and function names can make it difficult to determine its true purpose. This is a common technique used in malicious code to evade detection and analysis. However, the absence of other red flags such as redirections, tracking, and advertisements suggests that the code may not be highly malicious. The presence of long random hexadecimal strings is also not observed in this code. Therefore, a moderate level of suspicion is warranted. |
function a0Y(s,j){var i=a0S();return a0Y=function(u,S){u=u-0x1bb;var Y=i[u];return Y;},a0Y(s,j);}function a0S(){var Kw=['_finalizers','gusiC','_next','20246970oZKESw','ignoreCase','xWOWW','MessageChannel','sEqkm','remove','_socket','withoutSetter','qpHQv','zNXTr','pop','$(?!\x5cs)','deserializer','rejectionhandled','TypeError','Scheduled\x20action\x20threw\x20falsy\x20error','ObjectUnsubscribedError','closed','unsafe','XrBDp','dCQeY','ldgfY','sticky','emit','Bad\x20Promise\x20constructor','Xpixf','charCodeAt','_trimBuffer','mdEBD','bjVxF','EWuBc','RLeUH','clearImmediate','wmXDu','currentObservers','2092MiFaiE','\x20is\x20not\x20iterable','2971071LodsMF','defineProperties','java','delay','ruSsE','2087615NYUHvT','thrownError','Ihcfe','bYeqO','Reflect','\x20is\x20not\x20a\x20function','Event','operator','observable','You\x20provided\x20','Zxpdj','arpYi','push','pending','vpjvF','IS_ITERATOR','Promise-chain\x20cycle','closeObserver','create','concat','style','\x20where\x20a\x20stream\x20was\x20expected.\x20You\x20can\x20provide\x20an\x20Observable,\x20Promise,\x20ReadableStream,\x20Array,\x20AsyncIterable,\x20or\x20Iterable.','owuuP','31263710JxhIOc','_connectSocket','type','nonConfigurable','data','iAjce','rejection','lkhbC','symbol\x20detection','emARY','shift','wOzlK','hasOwnProperty','iframe','toStringTag','get\x20','TcqIQ','parse','script','ACEth','Deno','code','YrOoQ','iFRHm','host','geITD','finalize','hGQVl','complete','_resetState','setInterval','Function','9065696cqrZFT','url','oaiNg','String','4145418dHRypg','HynOW','getOwnPropertySymbols','Symbol(','aFdQf','number','[object\x20','clearInterval','\x20is\x20not\x20a\x20constructor\x20or\x20null','MutationObserver','SUBCLASSING','RGQPF','releaseLock','find','return\x20(function()\x20','asyncIterator','ySjfs','Symbol.','trys','fail','7nUzbcM','__core-js_shared__','htmlfile','YiIXL','eAOXr','xaYHZ','native-string-replace','Promise','$<a>c','addEventListener','5721VtkZMQ','isArray','enumerable','','normalize','initialTeardown','_parentage','getterFor','name','Can\x27t\x20set\x20','toString','_windowTime','SoVcJ','fPdsi','message','useDeprecatedSynchronousErrorHandling','status','chivx','','indexOf','something','xnfqV','open','6lsMuXk','setTimeout','nWzzx','domain','groups','OIBFU','importScripts','Array','aYemU','global','yKOIA','ZJNjG','_infiniteTimeWindow','erFOS','floor','kQWtV','aEnIb','Object\x20already\x20initialized','YYogK','_timestampProvider','Null','dotAll','LOwfh','QxGzX','flush','errorThrown','postMessage','getReader','forEach','done','value','symbol','_execute','keys','configurable','ZrrVO','42ketxFO','partialObserver','YPQle','input','NPmpb','ceil','createEvent','(((.+)+)+)+$','Iterable\x20cannot\x20be\x20null','onreadystatechange','facade','HgCJk','Unhandled\x20promise\x20rejection','join','DbozQ','OkZrR','ops','target','','set','reject','slice','all','TkEWm','splice','iVPuz','get','REJECTION_EVENT','JPCWa','rejectionHandled','npUCi','QgoXM','errors','UlFYw','ejwmt','vUziV','unic | |
URL: https://doxcs.signedfiless.com Model: gpt-4o | ```json { "phishing_score": 8, "brands": null, "phishing": true, "suspicious_domain": true, "has_loginform": false, "has_captcha": false, "setechniques": true, "legitmate_domain": "unknown", "reasons": "The domain name 'signedfiless.com' is suspicious and does not match any known legitimate brand. The URL structure and the domain name itself appear to be designed to mimic legitimate services, which is a common social engineering technique used in phishing attacks. Additionally, the webpage displayed in the image is very minimalistic and lacks any identifiable branding or content, which is often a characteristic of phishing sites." } |
URL: https://doxcs.signedfiless.com Model: phi3 | { "primary_owner": "doxcs"} |
URL: https://doxcs.signedfiless.com Model: gpt-4o | ```json { "phishing_score": 9, "brands": "Microsoft", "phishing": true, "suspicious_domain": true, "has_loginform": true, "has_captcha": false, "setechniques": true, "legitmate_domain": "microsoft.com", "reasons": "The URL 'doxcs.signedfiless.com' does not match the legitimate domain name 'microsoft.com' associated with the brand Microsoft. The page contains a login form asking for a password, which is a common tactic used in phishing attacks. The domain name appears suspicious and unrelated to Microsoft, indicating a high likelihood of phishing." } |
URL: https://doxcs.signedfiless.com Model: phi3 | {"primary_owner": "microsoft"} |
URL: https://doxcs.signedfiless.com Model: gpt-4o | ```json { "phishing_score": 9, "brands": "Microsoft", "phishing": true, "suspicious_domain": true, "has_loginform": true, "has_captcha": false, "setechniques": true, "legitmate_domain": "microsoft.com", "reasons": "The URL 'doxcs.signedfiless.com' does not match the legitimate domain 'microsoft.com' associated with the brand Microsoft. The presence of a login form on a suspicious domain is a common phishing technique. The domain name appears to be unrelated to Microsoft, which is a strong indicator of a phishing attempt." } |
URL: https://doxcs.signedfiless.com Model: phi3 | {"primary_owner": "microsoft"} |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.994276936511089 |
Encrypted: | false |
SSDEEP: | |
MD5: | DEA371FEF86161E3C2DF9A8969438BE1 |
SHA1: | B92618A27D5D29E311C1342F330124B6014D8F94 |
SHA-256: | F95943F5516A464804011EC61B98CD25D6C382A094DF28000C8FDA645E37112A |
SHA-512: | A83979D626F139636BDDF8257A9480177FABCF0565C22E1C1254F58CCBAB19E6A63F2EABC395CC7775B85A3206B3C6ACCC613E8FA05A82FF1F8B3CD670767FA0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.009858072338085 |
Encrypted: | false |
SSDEEP: | |
MD5: | A01DF2CE4FEAF8140AAACB1DFF6B161C |
SHA1: | 2CE7DC83C4FE71CC324F26B916C12C5258760127 |
SHA-256: | 1B1848423B6597F1967928989E4D19E146982EED0B1E3C93ABE8B58AF990FEC0 |
SHA-512: | 684F993E1301D25979866024AD9C0567C94F3B566E33BF8DF36BED7C6633621856B447EDB535EF431B4274B51B0F99520BD10B57759CF013CCA67BE44441D9AC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.014506161771463 |
Encrypted: | false |
SSDEEP: | |
MD5: | E8D1EE406BF5AB2150301DC95FF85E5B |
SHA1: | 950B41868D9A84687357589187308318D8AB33C1 |
SHA-256: | E461CEBE1939C42552A1E16BE2E7D31F1AE0A21C7A9556AB6780A60EFC37D829 |
SHA-512: | 3751C6A4E179FDB1FB953C60523FE93BC8828A63FAD913F9A89DA186ED61FEE3F63589CE4710672AF9EFE2132A1F36729D7FC3259D12B227B897574EB3B44AD2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.006897772239316 |
Encrypted: | false |
SSDEEP: | |
MD5: | FD2839902D03C135DD18CAE9FE066EE7 |
SHA1: | 92F94E26521018ED17D651F46B6C43308CC93D35 |
SHA-256: | D5B6E7B4EC8CBF71F569DE7043A89AB744270F0728D5A40E5C130E1D9410BE19 |
SHA-512: | 36DD5109834F47A9733BE0CEBE758FE45DDD8ADAAB4733E1BB04558A1F6EBDD6D14FA08048E811B7C279E5FC4E73E23B046E904780520834E4943532D5CCD7A9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9990409335362567 |
Encrypted: | false |
SSDEEP: | |
MD5: | CD4D9D781221B68C84528D6475486C70 |
SHA1: | 17B6358464FB7BA58CE31910E52CC37E976F5023 |
SHA-256: | E914040A2E065C1A7C8AEBE44D64B8430E45916E8D4FB30431A0E6C2B549523F |
SHA-512: | BF16D2D39CC81332787AC8ABDA08D3C07A16A4688F7436C8E87821490402B0E10B8ECC613FBA5EA1A0F4777780A511D71D37FE37B0CC9D9109AF7A52EC24C757 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.008389286458454 |
Encrypted: | false |
SSDEEP: | |
MD5: | 005BE660600DAD72C191778E6AE49BF8 |
SHA1: | 27FE9D0AA804985756F8BDA6BA66EADAA92FE004 |
SHA-256: | 0ED065BC6F6E844A6C0766703D3ABEF8A52F3ECE7466604BDEBEDF0A19087955 |
SHA-512: | 55117EBADEC2FB1CD80FFE4778268D0EC3A142DBBCED3632608F01F1013ED850CD23D89A481C964FCDF221867754ADDC0C87A883069DB21670C609E18493F9BF |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1162 |
Entropy (8bit): | 7.842201335884505 |
Encrypted: | false |
SSDEEP: | |
MD5: | F40BC02C851777352BBFFDE98ADB5759 |
SHA1: | F9D127058C02438A07D73C03E1C799120BFA66C2 |
SHA-256: | 6529723AC1C652BBB33CAEEA99D1DA259ACA985B47E8A9A35954C455A35B585E |
SHA-512: | C1F811EBD1E904C9000AF1CF3AD9252A4E6F1FEC69317F5765902B2897BC35C748C81DB72992C173A8D72D8CE6A11B0EFE32C2C0259F2B57858E3E83725F89A1 |
Malicious: | false |
Reputation: | unknown |
URL: | https://l1ve.signedfiless.com/Me.htm?v=3 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72 |
Entropy (8bit): | 4.241202481433726 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9E576E34B18E986347909C29AE6A82C6 |
SHA1: | 532C767978DC2B55854B3CA2D2DF5B4DB221C934 |
SHA-256: | 88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D |
SHA-512: | 5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 15909 |
Entropy (8bit): | 7.9848236258516385 |
Encrypted: | false |
SSDEEP: | |
MD5: | B260B7CA3C8B7A5B88FF414648206F72 |
SHA1: | F3AE08F4023C6168A7E4F563EDE1687D0123946D |
SHA-256: | 3CC016237B13180A2DB2BE5C939343C1FAEE1B63B37237CEDDF6B243DCFE3573 |
SHA-512: | 5183F3BB777B7E007B73362F856248D7E2D389B30033903A2E420857DD2339CCE6650258128889B61A35F756B46DD310D663F6A188A1CF78B5C86E6B6EC77BD4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_xjhg4agbaxjwmouxqhapag2.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 54366 |
Entropy (8bit): | 7.995334526638177 |
Encrypted: | true |
SSDEEP: | |
MD5: | E019767577F658370F5D019854893057 |
SHA1: | 476483F30919AE8AAC325227D71770C9007EDD83 |
SHA-256: | EA74FCE4676C0D6D3189A5B41BD94A78AE79F78F5455B7FC138D46F840D1DFB7 |
SHA-512: | 7DEC8CCC1A21293C9C369D159E4DD5361DE8F34DA6187DC294B80529978D66B8529039C72FB414219B688AB8B3F6CF1AF58DA23E0A13227C079095E172984AC6 |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/asyncchunk/convergedlogin_pcustomizationloader_8e14dcf0e3ff5580d170.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20323 |
Entropy (8bit): | 7.979831473812092 |
Encrypted: | false |
SSDEEP: | |
MD5: | 09519204FE1472294CD8FB2D6B10C7AB |
SHA1: | D172FBE0B5A19FD04D27291CD13B00331E6E15E6 |
SHA-256: | E0C681C273C20F70B6CEA1D4907543A06E134E456BD961B21E2EFD17E6B9CD8F |
SHA-512: | 19507B04B01C2560558101A08E0283C370D05A01BBC9528EB180A41EBF82AE8781F391D599986A849D82BA138E1E32651567C19C23417855291E59BC90841BDA |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/ests/2.1/content/cdnbundles/converged.v2.login.min_9oft0ybq1qhuafkqh5wryq2.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 49708 |
Entropy (8bit): | 7.995035999348534 |
Encrypted: | true |
SSDEEP: | |
MD5: | 99477B5C332710AFAFB934A2E93990D1 |
SHA1: | 96F6C5E82DCF9E9305401E9CAAFE6D27F8CD5157 |
SHA-256: | A9458700E449C6AB7ECD6F027FD9196888A2B46AF59E7399F01804C8ADE6F3C9 |
SHA-512: | A4913E3F5D93B5E95249DF18CF905ECFFEB728A15F1ADB35EAF36BBAD74E7FDE37256C6828FC2B4DE72F3FC2CC26BB84B0D9528C8CDA019DF250EEE91917B961 |
Malicious: | false |
Reputation: | unknown |
URL: | https://fe63ee9f-c32a1353.signedfiless.com/shared/1.0/content/js/BssoInterrupt_Core_RY3pVDLvjU_KKLtTKxjDFA2.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 673 |
Entropy (8bit): | 7.6584200238076905 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2D2CBA7D7DC75F3BA9DC756738D41A6E |
SHA1: | F87FD26066ED5E52A65DEE0ED2D581D3C3EA15AC |
SHA-256: | 00E21864CF1BC70302EBB5B496C6C471A7DA8CBF600630B478A3E2376ED20EA2 |
SHA-512: | 46F17658CA247C02F612213025350390D8F62179C8DE26725EB17F5CCFAFDD63F2149DA1765D3C2F3A12FE85EF29CAC58457B0D5C2F8DA8DED6E1231A35F199D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 61134 |
Entropy (8bit): | 7.9953502288966085 |
Encrypted: | true |
SSDEEP: | |
MD5: | F6E22923E909581895535ED538866E6D |
SHA1: | B710762C3278C8FA553EF180AF467183D399C8C8 |
SHA-256: | 1985D1C1C02254FD380A132D6977510DDBB8647DEC7F0859913BC23E1228561A |
SHA-512: | 2830545DD86B80863309DBB8073ADEF25589477EBFFED7D1945578F7C9ECF9A0D40C4653493390E94D698A8F8BB58042BD02BFBFA986D522154A006D7B547F0A |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 621 |
Entropy (8bit): | 7.6770058072183405 |
Encrypted: | false |
SSDEEP: | |
MD5: | ECC8894D3791BEDDB4E0226F8DAB065A |
SHA1: | 6510EB51E76A49746C526E432455549B50DE5AF1 |
SHA-256: | 64C8C0A9EFBC27AD86EAEC90465B75C52AE8CD68F7E76FC9431DC6AE66072AC3 |
SHA-512: | 02B20BE98C22EBF7886FE68008C4ED42E3F8FF6ADC8DD7BC1A43A8C4F6FD56CC932EFC5500249A4FAA5024574A841AD10FC8DDB8221CB7226E0E16DEA63F7052 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2672 |
Entropy (8bit): | 6.640973516071413 |
Encrypted: | false |
SSDEEP: | |
MD5: | 166DE53471265253AB3A456DEFE6DA23 |
SHA1: | 17C6DF4D7CCF1FA2C9EFD716FBAE0FC2C71C8D6D |
SHA-256: | A46201581A7C7C667FD42787CD1E9ADF2F6BF809EFB7596E61A03E8DBA9ADA13 |
SHA-512: | 80978C1D262BC225A8BA1758DF546E27B5BE8D84CBCF7E6044910E5E05E04AFFEFEC3C0DA0818145EB8A917E1A8D90F4BAC833B64A1F6DE97AD3D5FC80A02308 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7407 |
Entropy (8bit): | 7.9750511297413125 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2DEA0C16ED50A8C68AC7C5763780360F |
SHA1: | 89BBB21CD82BCB07C6F39312F1B8F2E58FAAE252 |
SHA-256: | 205B861EDBE7DEE41A4A7D80DA7B33FF42BE48E7E0521F9022C41B4D7807777A |
SHA-512: | F092CF6BD61B3E544ED04374E26BC055F47C0BA84D0CEFF99C2E3DA716E75CC04A0595C522050D0AAB8046FC67881DFFF48CCAD2FAC92BCBCB14342F0261A51D |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/asyncchunk/convergedlogin_ppassword_4d39c0367444c533fcd7.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3620 |
Entropy (8bit): | 6.867828878374734 |
Encrypted: | false |
SSDEEP: | |
MD5: | B540A8E518037192E32C4FE58BF2DBAB |
SHA1: | 3047C1DB97B86F6981E0AD2F96AF40CDF43511AF |
SHA-256: | 8737D721808655F37B333F08A90185699E7E8B9BDAAA15CDB63C8448B426F95D |
SHA-512: | E3612D9E6809EC192F6E2D035290B730871C269A267115E4A5515CADB7E6E14E3DD4290A35ABAA8D14CF1FA3924DC76E11926AC341E0F6F372E9FC5434B546E5 |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323.gif |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 28 |
Entropy (8bit): | 4.164497779200461 |
Encrypted: | false |
SSDEEP: | |
MD5: | 17C4BD96DCB397D1D62D24921BC4FEBA |
SHA1: | 2C0F2AFF858069D582A97867B183EBD5DC8A9FCB |
SHA-256: | 3549DBC06BDD994A38C9A29AECD7E8F9577E2150D15F8D6B0533B4D250666514 |
SHA-512: | 9659C4D5B7EF0C852428D3AE8A8EE816438E268E4537FFA70823C9CB2C240252E6D9E863B2AE95F39397172EEFAAA73541123DC9255C9B37FC9437C655F55A78 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwmoMJR7Ec47dxIFDU9-u70SBQ1Xevf9?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 121439 |
Entropy (8bit): | 7.997777894781062 |
Encrypted: | true |
SSDEEP: | |
MD5: | 122A6EAC405B0B369D309EF81494FD3D |
SHA1: | B785F69698E9699D9D6AF0BAD14D822048DE7D74 |
SHA-256: | 43787773DF215A1F15200E9AAE710F253F08BC5058D7B953CA6AAA4835F5781B |
SHA-512: | D03F7BD26DD04A26FEE79900B80196C3067CFEC4B6391340BEF96AA6C38C4F7C03C7167029995316B09F0065579C8335385AB0FB5C11BD60BF33268650C90CEE |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/ConvergedLogin_PCore_IzWdInmtlEhKEALU3I54UA2.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2279 |
Entropy (8bit): | 7.354295352983905 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7E0D59593F3377B72C29435C4B43954A |
SHA1: | B4C5C39A6DFB460BBD2EACCEB09EC8079FB6A8E2 |
SHA-256: | 62D706019A0D80173113EF70FBBEE12F286E8E221534BE788448AADA4B14C8E8 |
SHA-512: | 397416A6A96A39F46F22E906A60E56067E5B7B11FB0597A733F862FC077C88D5ED31F51A82709A56F6082FB1F2F72F9A0FE0849E3DD493BB4240C265B546AAD3 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 219 |
Entropy (8bit): | 4.891973020166299 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1BBC8377F27C17B8B8F92D4C58206650 |
SHA1: | B13F11FABCA4F7CF3E8F693E8E55BDE77F388C68 |
SHA-256: | 0A407E574325B755FFCB41F9F59C9C41449AE7BCC59DC59238DF7D15AD889F29 |
SHA-512: | A11B156E496323E5E29DE444CFAF442EBBCB0FF05620F799E858533DA17B0517F99A55108E157809DE7E6B0D722A71C54D3A43DB199D9DEA053B547CE3D848DD |
Malicious: | false |
Reputation: | unknown |
URL: | https://mwtelhasecologicas.com.br/wp-includes/syandm/?utm_source=rovis-newsletter.beehiiv.com&utm_medium=newsletter&utm_campaign=new-post |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 35840 |
Entropy (8bit): | 7.99272225932518 |
Encrypted: | true |
SSDEEP: | |
MD5: | 12F5585257FCEDB13227ABF578A246EC |
SHA1: | C895DC3AE2291D5BB6FB5C8940CBF4DBED86A565 |
SHA-256: | 8BE19EA62F9322A88920B4440242588D05558A32C44CE212C749FC4A15495A0A |
SHA-512: | B85F0CB04C2AB3C53BE1A31E945657DD6D66CB0D2094A83AFEE730CA6C11D4744108F3E3AA501FBAE3B76E5D0E0EC1440EBC1DAE87AC0364B61C53E40234E630 |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/asyncchunk/convergedlogin_pstringcustomizationhelper_ea3e62a2bdfb2b2ee8c8.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1435 |
Entropy (8bit): | 7.860223690068481 |
Encrypted: | false |
SSDEEP: | |
MD5: | DF6A7721C242813411CC6950DF40F9B3 |
SHA1: | B2068C4A65C183AAD6FC22A44CC1FA449CD355B4 |
SHA-256: | AA53B6DC744357B392FC57C34E516BAE465D4A6837775C137A176D599C8EA948 |
SHA-512: | CDCFB686649F2061FE13A58841EB6A4E17F40951BA0C440C568B248E6128B6E0C4E79F95DC3EAB81286C103ED2A966F7058D22066466ADED482BF9ECAA6EA3CB |
Malicious: | false |
Reputation: | unknown |
URL: | https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg |
Preview: |