IOC Report
https://u.to/Ipn6IA

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 12:07:43 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 12:07:43 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 12:07:43 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 12:07:43 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 12:07:43 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 77
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 78
PNG image data, 301 x 265, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (32058)
dropped
Chrome Cache Entry: 80
JSON data
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (65451)
dropped
Chrome Cache Entry: 82
PNG image data, 301 x 265, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 84
HTML document, ASCII text, with very long lines (60321), with CRLF line terminators
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (32058)
downloaded
Chrome Cache Entry: 86
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (65356)
downloaded
Chrome Cache Entry: 88
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 89
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 90
ASCII text, with very long lines (65356)
dropped
Chrome Cache Entry: 91
SVG Scalable Vector Graphics image
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1976,i,11634382885594463964,18293891447601144557,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://u.to/Ipn6IA"

URLs

Name
IP
Malicious
https://u.to/Ipn6IA
malicious
https://reverx.webhop.org/Ra.html
malicious
https://u.to/Ipn6IA
195.216.243.155
malicious
https://api.telegram.org/$
unknown
malicious
https://fontawesome.com
unknown
https://ismo.web.app/is.js
199.36.158.100
https://use.fontawesome.com/releases/v5.0.9/js/all.js
unknown
https://www.zupimages.net/up/23/47/qvxm.png
104.21.233.198
https://www.notaires.fr/themes/custom/not/assets/img/logos/logo.svg
149.126.77.239
https://zupimages.net/up/23/47/qvxm.png
104.21.233.197
https://fontawesome.com/license
unknown
https://api.telegram.org/bot6920399308:AAENE5KPJ6ogBxyi3ynfP7YMKqgwFBTXu6M/sendMessage
149.154.167.220
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reverx.webhop.org
185.80.129.217
malicious
api.telegram.org
149.154.167.220
malicious
use.fontawesome.com
unknown
malicious
www.notaires.fr
unknown
malicious
u.to
195.216.243.155
www.zupimages.net
104.21.233.198
zupimages.net
104.21.233.197
www.google.com
172.217.16.132
dgurc.x.incapdns.net
149.126.77.239
ismo.web.app
199.36.158.100

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
185.80.129.217
reverx.webhop.org
Lithuania
malicious
104.21.233.197
zupimages.net
United States
104.21.233.198
www.zupimages.net
United States
149.126.77.239
dgurc.x.incapdns.net
Israel
192.168.2.17
unknown
unknown
192.168.2.18
unknown
unknown
192.168.2.5
unknown
unknown
199.36.158.100
ismo.web.app
United States
239.255.255.250
unknown
Reserved
195.216.243.155
u.to
United Kingdom
172.217.16.132
www.google.com
United States
There are 2 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://reverx.webhop.org/Ra.html
malicious
https://reverx.webhop.org/Ra.html