IOC Report
https://kongz.herokuapp.com/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 21:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 21:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 21:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 21:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 21:22:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 101
Web Open Font Format (Version 2), TrueType, length 18536, version 1.0
downloaded
Chrome Cache Entry: 102
Web Open Font Format (Version 2), TrueType, length 18588, version 1.0
downloaded
Chrome Cache Entry: 103
PNG image data, 60 x 48, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 104
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 106
PNG image data, 600 x 197, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (2345)
dropped
Chrome Cache Entry: 108
PNG image data, 366 x 300, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (7629), with no line terminators
downloaded
Chrome Cache Entry: 110
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 111
TrueType Font data, 15 tables, 1st "OS/2", 26 names, Macintosh, http://www.fatorcaos.com.brPerfect DOS VGA 437Regularzeh: Pixel Perfect Template: 2002Perfect DO
downloaded
Chrome Cache Entry: 112
MPEG ADTS, layer III, v1, 160 kbps, 48 kHz, JntStereo
downloaded
Chrome Cache Entry: 113
ASCII text, with very long lines (1301), with no line terminators
downloaded
Chrome Cache Entry: 114
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 115
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 116
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 117
ASCII text, with very long lines (1301), with no line terminators
dropped
Chrome Cache Entry: 118
PNG image data, 600 x 197, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 119
PNG image data, 264 x 80, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 120
ASCII text, with very long lines (2343)
downloaded
Chrome Cache Entry: 121
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 122
ASCII text, with very long lines (7629), with no line terminators
dropped
Chrome Cache Entry: 123
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 124
ASCII text, with very long lines (2343)
dropped
Chrome Cache Entry: 125
HTML document, ASCII text, with very long lines (26309)
downloaded
Chrome Cache Entry: 126
ASCII text, with very long lines (7981), with no line terminators
dropped
Chrome Cache Entry: 127
ASCII text, with very long lines (3228), with no line terminators
downloaded
Chrome Cache Entry: 128
PNG image data, 132 x 36, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 129
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 130
ASCII text, with very long lines (7251), with no line terminators
downloaded
Chrome Cache Entry: 131
ASCII text, with very long lines (7981), with no line terminators
downloaded
Chrome Cache Entry: 132
ASCII text, with very long lines (2345)
downloaded
Chrome Cache Entry: 133
Web Open Font Format (Version 2), TrueType, length 18596, version 1.0
downloaded
Chrome Cache Entry: 134
PNG image data, 600 x 197, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 135
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 136
PNG image data, 600 x 197, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 137
ASCII text, with very long lines (3228), with no line terminators
dropped
Chrome Cache Entry: 138
PNG image data, 132 x 36, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 139
ASCII text, with very long lines (7251), with no line terminators
dropped
Chrome Cache Entry: 140
ASCII text
downloaded
Chrome Cache Entry: 141
ASCII text, with very long lines (65465), with no line terminators
downloaded
Chrome Cache Entry: 142
JSON data
downloaded
Chrome Cache Entry: 143
Audio file with ID3 version 2.2.0, contains: MPEG ADTS, layer III, v1, 160 kbps, 48 kHz, JntStereo
downloaded
Chrome Cache Entry: 144
PNG image data, 366 x 300, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 145
PNG image data, 60 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 146
ASCII text, with very long lines (65465), with no line terminators
dropped
Chrome Cache Entry: 147
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 148
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 149
PNG image data, 264 x 80, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
ASCII text, with no line terminators
downloaded
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=2232,i,1002402156043792277,1975116994732021957,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://kongz.herokuapp.com/"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5680 --field-trial-handle=2232,i,1002402156043792277,1975116994732021957,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://wc:d4f5a847-12c8-4881-8f8b-4f199a3d14db@0.0.0.1/?bridge=https%3A%2F%2Fy.bridge.walletconnect.org&key=7366c1f7eb68c465f4e34b64d99368292a8f52bcdc17ef3e741bb574ad2c543f
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1996,i,6229056224484381555,8413784757252883381,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://kongz.herokuapp.com/
https://kongz.herokuapp.com/_next/static/chunks/pages/claim-aac29ee389522d36.js
3.210.192.5
https://kongz.herokuapp.com/static/og.png
unknown
https://kongz.herokuapp.com/_next/static/RhbpwpzRGZKh5_yOlzj8K/_buildManifest.js
3.210.192.5
https://kongz.herokuapp.com/_next/static/RhbpwpzRGZKh5_yOlzj8K/_ssgManifest.js
3.210.192.5
https://kongz.herokuapp.com/
3.210.192.5
https://kongz.herokuapp.com/_next/static/RhbpwpzRGZKh5_yOlzj8K/_middlewareManifest.js
3.210.192.5
https://kongz.herokuapp.com/_next/static/chunks/webpack-c2c08a82554d68d5.js
3.210.192.5
https://kongz.herokuapp.com/jungle-adventure
https://kongz.herokuapp.com/static/header_right.png
3.210.192.5
https://tagassistant.google.com/
unknown
https://kongz.herokuapp.com/static/logo_footer.png
3.210.192.5
https://kongz.herokuapp.com/static/favicon.png
3.210.192.5
https://kongz.herokuapp.com/static/header_left.png
3.210.192.5
https://kongz.herokuapp.com/_next/static/chunks/main-a02e7d4f7d70ed47.js
3.210.192.5
http://www.fatorcaos.com.brzehhttp://www.fatorcaos.com.brhttp://www.fatorcaos.com.brhttp://www.fator
unknown
https://ampcid.google.com/v1/publisher:getClientId
unknown
https://registry.walletconnect.com/api/v2/wallets
104.18.26.46
https://kongz.herokuapp.com/_next/static/chunks/pages/jungle-adventure-f1857ca9e577ac8f.js
3.210.192.5
https://cct.google/taggy/agent.js
unknown
https://kongz.herokuapp.com/_next/static/chunks/framework-55082845d7a6fe89.js
3.210.192.5
https://www.google.com
unknown
https://kongz.herokuapp.com/static/sound/ui_loop.mp3
3.210.192.5
http://www.fatorcaos.com.brPerfect
unknown
https://kongz.herokuapp.com/_next/static/chunks/687-fe699470283ea8b7.js
3.210.192.5
https://www.google.com/ads/ga-audiences
unknown
https://www.google.%/ads/ga-audiences
unknown
https://td.doubleclick.net
unknown
https://kongz.herokuapp.com/_next/static/chunks/721-22935fe043ceb34d.js
3.210.192.5
https://kongz.herokuapp.com/_next/static/chunks/pages/_app-377ffddd4f21e8b2.js
3.210.192.5
https://stats.g.doubleclick.net/j/collect
unknown
https://kongz.herokuapp.com/static/font/Perfect_DOS_VGA_437.ttf
3.210.192.5
https://kongz.herokuapp.com/static/logo_header.png
3.210.192.5
https://kongz.herokuapp.com/_next/static/chunks/29107295-2c3ce868677a27a4.js
3.210.192.5
https://kongz.herokuapp.com/_next/static/chunks/204-f95fb4b4053a84c6.js
3.210.192.5
https://kongz.herokuapp.com/static/logo_small_white.png
3.210.192.5
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
www.google.com
142.250.186.100
registry.walletconnect.com
104.18.26.46
fp2e7a.wpc.phicdn.net
192.229.221.95
kongz.herokuapp.com
3.210.192.5
y.bridge.walletconnect.org
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.8
unknown
unknown
3.210.192.5
kongz.herokuapp.com
United States
192.168.2.6
unknown
unknown
239.255.255.250
unknown
Reserved
104.18.26.46
registry.walletconnect.com
United States
142.250.186.100
www.google.com
United States

DOM / HTML

URL
Malicious
https://kongz.herokuapp.com/jungle-adventure
https://kongz.herokuapp.com/jungle-adventure
https://kongz.herokuapp.com/jungle-adventure