IOC Report
https://fassouyatajadalravuij.blob.core.windows.net/fassouyatajadalravuij/1.html?KIUS8wH0YY7cB2NMwxGsVoa5iezV7W9cvLqamEPM8HdxqBLgYyX6Goh6aNwgjitRkRWLcAfZPzQwfAIRlIAPQ3jfogxjD1t9nA60#cl/26081_md/7/18507/5419/19036/1614238

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 54
Web Open Font Format (Version 2), TrueType, length 18704, version 1.0
downloaded
Chrome Cache Entry: 55
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 56
PNG image data, 250 x 39, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 57
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 58
Java source, ASCII text
downloaded
Chrome Cache Entry: 59
PNG image data, 250 x 39, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 60
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 61
ASCII text
downloaded
Chrome Cache Entry: 62
PNG image data, 600 x 531, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 63
PNG image data, 600 x 531, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 64
ASCII text, with very long lines (12412)
downloaded
Chrome Cache Entry: 65
YAC archive data
downloaded
Chrome Cache Entry: 66
ASCII text, with very long lines (11692)
downloaded
Chrome Cache Entry: 67
ASCII text, with very long lines (8011)
downloaded
Chrome Cache Entry: 68
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 69
ASCII text, with very long lines (7321)
downloaded
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 --field-trial-handle=2380,i,10488771299582749174,9797868801963240454,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://fassouyatajadalravuij.blob.core.windows.net/fassouyatajadalravuij/1.html?KIUS8wH0YY7cB2NMwxGsVoa5iezV7W9cvLqamEPM8HdxqBLgYyX6Goh6aNwgjitRkRWLcAfZPzQwfAIRlIAPQ3jfogxjD1t9nA60#cl/26081_md/7/18507/5419/19036/1614238"

URLs

Name
IP
Malicious
https://fassouyatajadalravuij.blob.core.windows.net/fassouyatajadalravuij/1.html?KIUS8wH0YY7cB2NMwxGsVoa5iezV7W9cvLqamEPM8HdxqBLgYyX6Goh6aNwgjitRkRWLcAfZPzQwfAIRlIAPQ3jfogxjD1t9nA60#cl/26081_md/7/18507/5419/19036/1614238
malicious
https://event.trk-adulvion.com/register/event_log/v9e118mez8
104.21.80.104
https://bltizflash.lat/index2.php?id=209&s1=351947&s2=1173598737&s3=6398&p=us5mbshp7c
172.67.138.227
https://trk-amropode.com/scripts/pg/v9e118mez8
172.67.205.30
https://duvetflip.sbs/service-worker.js
104.21.71.85
https://trk-amropode.com/scripts/sw/v9e118mez8
172.67.205.30
https://duvetflip.sbs/?32cecd10adf41758e498d801f1d9119a
https://a.nel.cloudflare.com/report/v4?s=1RF54lSmc0A3NPAZPu0TYUe1%2FkIxiHEGwYPg%2FR7ugbKgcNc4wbjHleOyxXRxDTo7nloXrCeFUBZXu3OYQ%2Fh6gk%2Fu30MC8JK3QcPE4ItVCIUMeGcd5qM0eRGDEcyOxx70
35.190.80.1
https://duvetflip.sbs/inc/msg.js?98d5d532843288f7feebd03089f211b1
104.21.71.85
https://duvetflip.sbs/master/us169/ntfico.png
104.21.71.85
https://servingspec.com/0/0/0/cebf06515fb74f5ce98492177dc6c2eb/
unknown
https://code.jquery.com/jquery-2.2.4.min.js
151.101.2.137
https://servingspec.com/0/0/0/cebf06515fb74f5ce98492177dc6c2eb/7/26081_18/19036_1614238_18507_5419_md
217.78.233.95
https://duvetflip.sbs/master/us169/bundle.6659c6537395db0e8db6.css
104.21.71.85
https://duvetflip.sbs/master/us169/sapp.png
104.21.71.85
https://trk-adulvion.com/scripts/push/v9e118mez8
172.67.177.226
https://duvetflip.sbs/master/us169/xmlogo.png?v=1
104.21.71.85
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bltizflash.lat
172.67.138.227
bg.microsoft.map.fastly.net
199.232.210.172
a.nel.cloudflare.com
35.190.80.1
code.jquery.com
151.101.2.137
trk-amropode.com
172.67.205.30
www.google.com
172.217.215.147
trk-adulvion.com
172.67.177.226
event.trk-adulvion.com
104.21.80.104
duvetflip.sbs
104.21.71.85
fp2e7a.wpc.phicdn.net
192.229.211.108
servingspec.com
217.78.233.95
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.215.147
www.google.com
United States
172.67.205.30
trk-amropode.com
United States
192.168.2.6
unknown
unknown
151.101.2.137
code.jquery.com
United States
239.255.255.250
unknown
Reserved
217.78.233.95
servingspec.com
Russian Federation
104.21.71.85
duvetflip.sbs
United States
172.67.177.226
trk-adulvion.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
172.67.138.227
bltizflash.lat
United States
172.67.143.252
unknown
United States
104.21.80.104
event.trk-adulvion.com
United States
There are 2 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://duvetflip.sbs/?32cecd10adf41758e498d801f1d9119a