IOC Report
https://portal.bakfar.workers.dev/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 100
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 101
HTML document, ASCII text, with very long lines (15530)
downloaded
Chrome Cache Entry: 102
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 103
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 69
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
dropped
Chrome Cache Entry: 70
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
downloaded
Chrome Cache Entry: 71
ASCII text, with very long lines (11461)
downloaded
Chrome Cache Entry: 72
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 73
ASCII text, with very long lines (32030)
downloaded
Chrome Cache Entry: 74
HTML document, ASCII text, with very long lines (15530)
downloaded
Chrome Cache Entry: 75
PNG image data, 2529 x 1350, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (60130)
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (60130)
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (26500)
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (26500)
dropped
Chrome Cache Entry: 82
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 83
JSON data
dropped
Chrome Cache Entry: 84
ASCII text, with very long lines (48664)
downloaded
Chrome Cache Entry: 85
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (26500)
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (32012)
downloaded
Chrome Cache Entry: 88
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 609687
downloaded
Chrome Cache Entry: 89
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1864
dropped
Chrome Cache Entry: 90
ASCII text, with very long lines (19015)
downloaded
Chrome Cache Entry: 91
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 90616
downloaded
Chrome Cache Entry: 92
JSON data
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (60130)
downloaded
Chrome Cache Entry: 94
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1864
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (65325)
downloaded
Chrome Cache Entry: 96
HTML document, ASCII text, with very long lines (15530)
dropped
Chrome Cache Entry: 97
ASCII text
downloaded
Chrome Cache Entry: 98
PNG image data, 2529 x 1350, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 99
ASCII text, with very long lines (32065)
downloaded
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1756,i,15801424558716426216,5039533989991988249,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://portal.bakfar.workers.dev/"

URLs

Name
IP
Malicious
https://portal.bakfar.workers.dev/
malicious
https://portal.bakfar.workers.dev/
malicious
https://fontawesome.com
unknown
https://kit.fontawesome.com
unknown
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
104.17.24.14
https://app.forexliteoptions.com/core/database/xero/css/hover.css
199.115.115.118
https://getbootstrap.com)
unknown
https://ka-f.fontawesome.com
unknown
https://code.jquery.com/jquery-3.2.1.slim.min.js
151.101.66.137
https://i.gyazo.com/214d89a26f0ac918a09f216a1b0f97b4.png
104.18.24.163
https://portal.bakfar.workers.dev/favicon.ico
172.67.154.137
https://code.jquery.com/jquery-3.1.1.min.js
151.101.66.137
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
104.18.10.207
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
104.18.11.207
http://opensource.org/licenses/MIT).
unknown
https://getbootstrap.com/)
unknown
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
104.18.11.207
https://fontawesome.com/license/free
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stackpath.bootstrapcdn.com
104.18.10.207
part-0013.t-0009.t-msedge.net
13.107.246.41
code.jquery.com
151.101.66.137
cdnjs.cloudflare.com
104.17.24.14
i.gyazo.com
104.18.24.163
maxcdn.bootstrapcdn.com
104.18.11.207
www.google.com
172.253.122.147
cs1227.wpc.alphacdn.net
192.229.211.199
part-0012.t-0009.t-msedge.net
13.107.246.40
app.forexliteoptions.com
199.115.115.118
portal.bakfar.workers.dev
172.67.154.137
fp2e7a.wpc.phicdn.net
192.229.211.108
ka-f.fontawesome.com
unknown
kit.fontawesome.com
unknown
logincdn.msftauth.net
unknown
account.live.com
unknown
kit-free.fontawesome.com
unknown
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.107.246.41
part-0013.t-0009.t-msedge.net
United States
104.18.10.207
stackpath.bootstrapcdn.com
United States
192.168.2.4
unknown
unknown
199.115.115.118
app.forexliteoptions.com
United States
151.101.66.137
code.jquery.com
United States
104.21.72.191
unknown
United States
104.17.24.14
cdnjs.cloudflare.com
United States
104.18.25.163
unknown
United States
192.229.211.199
cs1227.wpc.alphacdn.net
United States
172.67.154.137
portal.bakfar.workers.dev
United States
172.253.122.147
www.google.com
United States
104.18.11.207
maxcdn.bootstrapcdn.com
United States
239.255.255.250
unknown
Reserved
104.18.24.163
i.gyazo.com
United States
There are 4 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://portal.bakfar.workers.dev/
malicious
https://account.live.com/ResetPassword.aspx?wreply=https://login.live.com/login.srf%3fwa%3dwsignin1.0%26rpsnv%3d13%26ct%3d1594824447%26rver%3d7.0.6737.0%26wp%3dMBI_SSL%26wreply%3dhttps%253a%252f%252foutlook.live.com%252fowa%252f%253fnlp%253d1%2526RpsCsrfState%253d096991c0-c96c-6a4e-6fe9-e91b0da948f1%26id%3d292841%26aadredir%3d1%26CBCXT%3dout%26lw%3d1%26fl%3ddob%252cflname%252cwld%26cobrandid%3d90015%26contextid%3d2C688CEDDDA7EE22%26bk%3d1594880420&id=292841&uiflavor=web&cobrandid=90015&uaid=657745d4db72409899b7bb19b09796de&mkt=EN-GB&lc=2057&bk=1594880420#
https://account.live.com/ResetPassword.aspx?wreply=https://login.live.com/login.srf%3fwa%3dwsignin1.0%26rpsnv%3d13%26ct%3d1594824447%26rver%3d7.0.6737.0%26wp%3dMBI_SSL%26wreply%3dhttps%253a%252f%252foutlook.live.com%252fowa%252f%253fnlp%253d1%2526RpsCsrfState%253d096991c0-c96c-6a4e-6fe9-e91b0da948f1%26id%3d292841%26aadredir%3d1%26CBCXT%3dout%26lw%3d1%26fl%3ddob%252cflname%252cwld%26cobrandid%3d90015%26contextid%3d2C688CEDDDA7EE22%26bk%3d1594880420&id=292841&uiflavor=web&cobrandid=90015&uaid=657745d4db72409899b7bb19b09796de&mkt=EN-GB&lc=2057&bk=1594880420#
https://account.live.com/ResetPassword.aspx?wreply=https://login.live.com/login.srf%3fwa%3dwsignin1.0%26rpsnv%3d13%26ct%3d1594824447%26rver%3d7.0.6737.0%26wp%3dMBI_SSL%26wreply%3dhttps%253a%252f%252foutlook.live.com%252fowa%252f%253fnlp%253d1%2526RpsCsrfState%253d096991c0-c96c-6a4e-6fe9-e91b0da948f1%26id%3d292841%26aadredir%3d1%26CBCXT%3dout%26lw%3d1%26fl%3ddob%252cflname%252cwld%26cobrandid%3d90015%26contextid%3d2C688CEDDDA7EE22%26bk%3d1594880420&id=292841&uiflavor=web&cobrandid=90015&uaid=657745d4db72409899b7bb19b09796de&mkt=EN-GB&lc=2057&bk=1594880420#