hexadl.line55.net

NAMECHEAP.COM

Domain Information

The domain hexadl.line55.net registered by NAMECHEAP.COM was initially registered in February of 2009 through ENOM, INC.. Currently this domain has been known to host various forms of malware. The hosted servers are located in Phoenix, Arizona within the United States which resides on the CloudFlare, Inc. network. The domain uses the CloudFlare CDN, a distributed domain name server service which utilizes a number of reverse proxy IP Addresses (see below).
Registrar:
ENOM, INC.

Server location:
Arizona, United States (US)

Create date:
Saturday, February 21, 2009

Expires date:
Thursday, February 21, 2019

Updated date:
Wednesday, November 13, 2013

ASN:
AS13335 CLOUDFLARENET - CloudFlare, Inc.,US

Root domain:

Google Safe Browsing:
unwanted

Scanner detections:
Malware distribution  (92% detected)

Scan engine
Details
Detections

Reason Heuristics
Threat.Win.Reputation.IMP, PUP.Installer.CondestilDevelopmentssl.Q, PUP.BechiroSL.Q, PUP.Systweak.Optional.Installer.Meta (L)
73.91%

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra, DownloadMR
52.17%

McAfee
Artemis!A942B3D27808, Artemis!481CB0A08225, Artemis!102169753FBC, Artemis!71C95E28B4AC, Artemis!C97614C14996, GenericATG-FARG!CB52891A1B10
43.48%

Trend Micro House Call
TROJ_GEN.R0CBH07FT14, TROJ_GEN.R02SH07FC14, TROJ_SPNR.3AH414, Suspicious_GEN.F47V0616, TROJ_GEN.R047C0EK614, TROJ_GEN.R047C0EL214, Suspicious_GEN.F47V1030
43.48%

Vba32 AntiVirus
TrojanDropper.Dapato, Downware.Morstar, suspected of Trojan.Downloader.gen.h
39.13%

IKARUS anti.virus
Trojan-Dropper.Win32.Dapato, PUA.Optional.Condestil, AdWare.BundleApp, Trojan.SuspectCRC, Hoax.Win32.RegistryCleaner
34.78%

Fortinet FortiGate
W32/Blocker.EUMM!tr, Riskware/Morstars, W32/Downloader_x.LU!tr, PossibleThreat.SB!tr
34.78%

Agnitum Outpost
Trojan.Agent, PUA.Firseria, PUA.Solimba, Trojan.Rogue
30.43%

K7 AntiVirus
Riskware , Unwanted-Program
30.43%

Kaspersky
Trojan-Dropper.Win32.Dapato, Trojan-Ransom.Win32.Blocker, not-a-virus:AdWare.Win32.Fiseria, Hoax.Win32.RegClnr, Hoax.Win32.RegistryCleaner
30.43%

Baidu Antivirus
Trojan.Win32.Dapato, Trojan.Win32.Ransomlock, Adware.Win32.FirseriaInstaller, Trojan.Win32.BadJoke
30.43%

Qihoo 360 Security
Win32/Trojan.Dropper.a9d, Win32/Trojan.Ransom.bca, Win32/Trojan.Dropper.ed4, HEUR/QVM10.1.Malware.Gen, HEUR/QVM42.0.Malware.Gen
30.43%

Sophos
Mal/Generic-S, Solimba Installer
26.09%

AVG
ScreenLocker, Generic, BundleApp_r
26.09%

Avira AntiVirus
TR/Ransom.Blocker.eumm, APPL/FirseriaM.A.1, APPL/Firseria.Gen8, TR/Rogue.12037268, TR/Rogue.59655, TR/Rogue.11955244
26.09%

The domain hexadl.line55.net has been seen to resolve to the following 4 IP addresses.

September 4, 2014

September 4, 2014

(CloudFlare)
May 31, 2014

(CloudFlare)
May 31, 2014

File downloads found at URLs served by hexadl.line55.net.

22 / 68    (Adware)
http://hexadl.line55.net/FLV_Media_Player.exe  (102169753fbc79a23c8c41ed58bb56f4)

1 / 68      (Malware)
http://hexadl.line55.net/insreg.exe  (86eaa9e10cec1f5a7fbfe6016387c1ac)

1 / 68      (Malware)
http://hexadl.line55.net/short.exe  (dbe8eab5e3fa7a319265b55daa8bdc4c)

18 / 68    (Malware)
http://hexadl.line55.net/prealert.exe  (481cb0a08225aa14c09fc3d015174eb1)

1 / 68      (Malware)
http://hexadl.line55.net/Google Chrome.exe  (d90708db1a1d17e818fda3f4e2698f04)

1 / 68      (Malware)
http://hexadl.line55.net/Mozilla Firefox.exe  (8a2a058658ab8e5ff397ed6895cf2fc8)

1 / 68      (Malware)
http://hexadl.line55.net/Opera.exe  (054f2db6da9a3afd265ef3439b40dde8)

1 / 68      (Malware)
http://hexadl.line55.net/auto.exe  (3880e27629cfb386ed309c8efc624113)

1 / 68      (Malware)
http://hexadl.line55.net/temp.exe  (c5ebff6a653c9a984bac2a4087ccc82b)

1 / 68      (Malware)
http://hexadl.line55.net/prealert.exe  (49dd510ea14583389e4e0058c28f4e80)

1 / 68      (Malware)
http://hexadl.line55.net/Install.exe  (39150956f012947f65910146f2354357)

1 / 68      (PUP)
http://hexadl.line55.net/rcpsetup_29466.exe  (96574e244d368052e55a95e10b000cb2)

16 / 68    (Malware)
http://hexadl.line55.net/regbat.exe  (71c95e28b4ace60cae96e7c56ad5cc45)

17 / 68    (Malware)
http://hexadl.line55.net/alert.exe  (3e03653504b4c034c04b6669d87fad75)

17 / 68    (Malware)
http://hexadl.line55.net/scan.exe  (3cb28bae1656f1e71fb0669d6e869089)

0 / 68
http://hexadl.line55.net/ifreg.exe  (e4a2263c5c1d4ed9411da47087b3517e)

3 / 68      (inconclusive)
http://hexadl.line55.net/hexads.exe  (50f7539bdd9ad76b8b0a35f736ecd911)

1 / 68      (Malware)
http://hexadl.line55.net/ifads.exe  (dea45064b079abd17cc5873d99e7a6ac)

20 / 68    (Malware)

29 / 68    (Adware)
http://hexadl.line55.net/FLV_Media_Player.exe  (cb52891a1b10c3ae4f1157abbe8079a2)

17 / 68    (Malware)
http://hexadl.line55.net/FLV-HD.exe  (6444c72f837484a7182cd0776f423487)

3 / 68      (Malware)
http://hexadl.line55.net/FLV-HD.exe  (4da25ebce048a4d716f3f151f72cb655)

16 / 68    (Malware)

15 / 68    (Malware)

URL:
http://hexadl.line55.net/

SSL certificate subject:
CN=sni67905.cloudflaressl.com, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated

SSL certificate issuer:
CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Web server:
cloudflare-nginx