IOC Report
https://delivery.attempt.failure.ebbs.co.za/public/MY096OineFzTCVJ56qDw3aMDByE0CDQ1

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 21:44:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 21:44:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 21:44:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 21:44:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 21:44:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 75
HTML document, ASCII text
downloaded
Chrome Cache Entry: 76
Web Open Font Format (Version 2), TrueType, length 156388, version 773.1280
downloaded
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
Web Open Font Format (Version 2), TrueType, length 117856, version 773.1280
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (27377)
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (44992)
downloaded
Chrome Cache Entry: 81
HTML document, Unicode text, UTF-8 text, with very long lines (39884)
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (30837)
downloaded
Chrome Cache Entry: 83
HTML document, ASCII text, with very long lines (5395)
downloaded
Chrome Cache Entry: 84
Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 85
Web Open Font Format (Version 2), TrueType, length 77160, version 4.459
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (27377)
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (65450)
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (1560)
dropped
Chrome Cache Entry: 89
HTML document, ASCII text, with very long lines (5395)
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (608)
dropped
Chrome Cache Entry: 91
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (1560)
downloaded
Chrome Cache Entry: 93
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (7840)
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (65321)
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (11461)
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (608)
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1956,i,3591811600789709649,7482124418222594721,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://delivery.attempt.failure.ebbs.co.za/public/MY096OineFzTCVJ56qDw3aMDByE0CDQ1"

URLs

Name
IP
Malicious
https://delivery.attempt.failure.ebbs.co.za/public/MY096OineFzTCVJ56qDw3aMDByE0CDQ1
malicious
https://delivery.attempt.failure.ebbs.co.za/public/js/session-recorder.js
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/webfa-solid-900.woff?eeccf4f66002c6f2ba24d3d22f2434c2
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fontsource/roboto/files/roboto-all-400-normal.woff?376ea5d93f71583052f65de4e0c6a92c
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/public/js/app.js
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fontsource/roboto/files/roboto-latin-400-normal.woff2?4673b4537a84c7f7a130799aa6af329b
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/favicon.ico
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/images/foo.png
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/public
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/public/MY096OineFzTCVJ56qDw3aMDByE0CDQ1
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/webfa-brands-400.ttf?527940b104eb2ea366c8630f3f038603
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/images/all.png
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/webfa-solid-900.ttf?be9ee23c0c6390141475d519c2c5fb8f
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/images/logo.png
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/public/
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/public/css/app.css
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/webfa-solid-900.woff2?1551f4f60c37af51121f106501f69b80
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/webfa-brands-400.woff?2285773e6b4b172f07d9b777c81b0775
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/JvUbxDhm9qZNMbdmVQYAGfBj2dFZwKmJ/
41.185.8.221
malicious
https://delivery.attempt.failure.ebbs.co.za/public/css/fonts/webfa-brands-400.woff2?d878b0a6a1144760244ff0665888404c
41.185.8.221
malicious
http://fontawesome.io
unknown
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/fonts/fontawesome-webfont.woff2?v=4.7.0
104.17.24.14
https://r.lr-in.com/i?a=mnnzup%2Fdus&r=5-d022c51c-95b8-4dd1-a4c8-04817972f99f&t=abfe46e2-bd74-45d7-9562-5e85b0e9b6b1&s=0&rs=0%2Cu&u=dfcfb221-b10e-4bbc-883b-38ffbd100214&is=1
104.198.23.205
https://ka-f.fontawesome.com
unknown
https://testibb.co
unknown
https://yandex.com
unknown
https://cdn.lr-in.com/logger-1.min.js
104.21.234.144
http://js.pusher.com
unknown
https://kit.fontawesome.com/f7165dd215.js
unknown
https://vc.hotjar.io/sessions/2895475?s=0.25&r=0.14830780915293795
143.204.9.96
about:blank
https://fontawesome.com/license/free
unknown
https://fontawesome.com
unknown
https://script.hotjar.com/modules.e4b2dc39f985f11fb1e4.js
13.227.219.28
https://github.com/pusher/pusher-js/tree/cc491015371a4bde5743d1c87a0fbac0feb53195#encrypted-channel-
unknown
https://ws-mt1.pusher.com/app/bc5ba70500b3342fb1aa?protocol=7&client=js&version=7.0.3&flash=false
44.205.42.17
https://sockjs-mt1.pusher.com/pusher/app/bc5ba70500b3342fb1aa/755/3vi74av1/xhr_streaming?protocol=7&client=js&version=7.0.3&t=1719960313617&n=1
34.201.239.212
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css
104.17.24.14
https://static.hotjar.com/c/hotjar-
unknown
https://static.hotjar.com/c/hotjar-2895475.js?sv=6
18.239.94.35
https://getbootstrap.com/)
unknown
http://fontawesome.io/license
unknown
https://kit.fontawesome.com
unknown
https://files.killbot.org/.cdn-cgi/killbot-security.js
unknown
https://a.nel.cloudflare.com/report/v4?s=n6UGn5ZkMFVkM7HffeoOtw%2F8L4E02dPg0dpuzSeGp7Gfhn%2Fafw0%2BTkGFkHa7QtfjyQBu56xc3fPEojuAW2W7MvQmy3B0QytAOSKTVCjoBoLA2mRT5dFHotzWDrn0nQBhAShsuucnKA%3D%3D
35.190.80.1
https://pusher.com
unknown
https://github.com/js-cookie/js-cookie
unknown
https://delivery.attempt.failure.ebbs.co.za/public/JvUbxDhm9qZNMbdmVQYAGfBj2dFZwKmJ
https://popper.js.org)
unknown
https://github.com/es-shims/es5-shim
unknown
https://js.pusher.com
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
delivery.attempt.failure.ebbs.co.za
41.185.8.221
malicious
a.nel.cloudflare.com
35.190.80.1
vc-live-cf.hotjar.io
143.204.9.96
prod-default.lb.logrocket.network
104.198.23.205
socket-mt1-ingress-1987402783.us-east-1.elb.amazonaws.com
44.205.42.17
cdn.lr-in.com
104.21.234.144
fp2e7a.wpc.phicdn.net
192.229.221.95
bg.microsoft.map.fastly.net
199.232.214.172
script.hotjar.com
13.227.219.28
cdnjs.cloudflare.com
104.17.24.14
www.google.com
142.250.186.68
ingress-sticky-haproxy-mt1-912d8b7308f82d6c.elb.us-east-1.amazonaws.com
34.201.239.212
static-cdn.hotjar.com
18.239.94.35
ka-f.fontawesome.com
unknown
kit.fontawesome.com
unknown
ws-mt1.pusher.com
unknown
vc.hotjar.io
unknown
static.hotjar.com
unknown
r.lr-in.com
unknown
sockjs-mt1.pusher.com
unknown
files.killbot.org
unknown
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
41.185.8.221
delivery.attempt.failure.ebbs.co.za
South Africa
malicious
142.250.186.68
www.google.com
United States
104.17.24.14
cdnjs.cloudflare.com
United States
18.239.94.35
static-cdn.hotjar.com
United States
104.21.234.144
cdn.lr-in.com
United States
192.168.2.4
unknown
unknown
143.204.9.96
vc-live-cf.hotjar.io
United States
239.255.255.250
unknown
Reserved
104.198.23.205
prod-default.lb.logrocket.network
United States
13.227.219.28
script.hotjar.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
34.201.239.212
ingress-sticky-haproxy-mt1-912d8b7308f82d6c.elb.us-east-1.amazonaws.com
United States
44.205.42.17
socket-mt1-ingress-1987402783.us-east-1.elb.amazonaws.com
United States
There are 4 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://delivery.attempt.failure.ebbs.co.za/public/JvUbxDhm9qZNMbdmVQYAGfBj2dFZwKmJ
about:blank