IOC Report
https://dallascounty.okta.com/tokens/NeVUAB-iI2cKWtW7tOCf/verify

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 17 14:51:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 17 14:51:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 17 14:51:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 17 14:51:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 17 14:51:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 69
PNG image data, 109 x 110, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 70
Web Open Font Format (Version 2), TrueType, length 20328, version 2.197
downloaded
Chrome Cache Entry: 71
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 72
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 74
Web Open Font Format (Version 2), TrueType, length 20416, version 2.197
downloaded
Chrome Cache Entry: 75
PNG image data, 70 x 70, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65460)
downloaded
Chrome Cache Entry: 80
JSON data
dropped
Chrome Cache Entry: 81
HTML document, ASCII text, with very long lines (451), with no line terminators
downloaded
Chrome Cache Entry: 82
PNG image data, 36 x 36, 8-bit gray+alpha, non-interlaced
dropped
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (40099)
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (51734)
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (10450)
downloaded
Chrome Cache Entry: 88
Unicode text, UTF-8 text, with very long lines (48877), with LF, NEL line terminators
downloaded
Chrome Cache Entry: 89
Web Open Font Format (Version 2), TrueType, length 20052, version 2.197
downloaded
There are 13 hidden files, click here to show them.

URLs

Name
IP
Malicious
https://dallascounty.okta.com/tokens/NeVUAB-iI2cKWtW7tOCf/verify
https://login.okta.com/discovery/iframe.html
https://dallascounty.okta.com/app/dallascounty_oraclesupplierportal_1/exk1q8yf2lgj3GuOL1d8/sso/saml?LoginHint=SERVICE%40JPPLUS.COM

Domains

Name
IP
Malicious
a1aa626c4e9a25e01.awsglobalaccelerator.com
13.248.168.94
d1jxv8lrmer55s.cloudfront.net
18.239.83.113
www.google.com
142.250.186.132
d37qf8t9pe6csu.cloudfront.net
108.138.7.85
ok3static.oktacdn.com
unknown
dallascounty.okta.com
unknown
login.okta.com
unknown

IPs

IP
Domain
Country
Malicious
1.1.1.1
unknown
Australia
13.248.168.94
a1aa626c4e9a25e01.awsglobalaccelerator.com
United States
18.239.83.113
d1jxv8lrmer55s.cloudfront.net
United States
108.138.7.85
d37qf8t9pe6csu.cloudfront.net
United States
142.250.186.163
unknown
United States
216.58.206.78
unknown
United States
192.168.2.16
unknown
unknown
142.251.168.84
unknown
United States
142.250.181.227
unknown
United States
239.255.255.250
unknown
Reserved
142.250.186.132
www.google.com
United States
99.84.9.120
unknown
United States
172.217.18.110
unknown
United States
There are 3 hidden IPs, click here to show them.