sub.frogyearleap.com

Joseph Davidson

Domain Information

The domain sub.frogyearleap.com registered by Joseph Davidson was initially registered in February of 2015 through GANDI SAS. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Seattle, Washington within the United States. The domain uses the Amazon Cloudfront CDN service which utilizes a number of proxy IP Addresses (see below).
Registrar:
GANDI SAS

Server location:
Washington, United States (US)

Create date:
Sunday, February 15, 2015

Expires date:
Wednesday, February 15, 2017

Updated date:
Monday, January 11, 2016

ASN:
AS16509 AMAZON-02 - Amazon.com, Inc.,US

Root domain:

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Bundler.Somoto, PUP.Installer.SITEONSPOT, PUP.Somoto.SiteonSpot.Bundler (M), PUP.Somoto.SITEONSPOT.Bundler (M), PUP.Somoto.SiteonSp.Bundler (M)
100.00%

AVG
AdLoad.S, Potentially harmful program Downloader.DFF
47.62%

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
47.62%

Dr.Web
Trojan.Packed.28357
42.86%

VIPRE Antivirus
Threat.4150696, Trojan.Win32.Generic
42.86%

Baidu Antivirus
Adware.Win32.Somoto
42.86%

Kaspersky
not-a-virus:Downloader.Win32.Agent, not-a-virus:Downloader.NSIS.Mazel, not-a-virus:Downloader.Win32.Somato
28.57%

ESET NOD32
Win32/Somoto.G potentially unwanted
23.81%

ESET NOD32
Win32/Somoto.G potentially unwanted application
19.05%

K7 AntiVirus
Trojan , Unwanted-Program
19.05%

Panda Antivirus
Generic Suspicious, Trj/CI.A
19.05%

Trend Micro House Call
TROJ_GEN.R047H07C915, TROJ_GEN.R047H07C815
19.05%

Sophos
PUA 'Somoto BetterInstaller', Generic PUA NG, Generic PUA HO
14.29%

AhnLab V3 Security
Win-PUP/Somoto, PUP/Win32.Somoto
14.29%

McAfee
Artemis!1475479B0F95, Artemis!0352B961D403, Artemis!45FF3D29D6AC
14.29%

The domain sub.frogyearleap.com has been seen to resolve to the following 92 IP addresses.

server-52-84-125-111.iad16.r.cloudfront.net
July 8, 2016

server-52-84-125-109.iad16.r.cloudfront.net
July 8, 2016

server-52-84-125-102.iad16.r.cloudfront.net
July 8, 2016

server-52-84-125-76.iad16.r.cloudfront.net
July 8, 2016

server-52-84-125-65.iad16.r.cloudfront.net
July 8, 2016

server-52-84-125-55.iad16.r.cloudfront.net
July 8, 2016

server-52-84-125-227.iad16.r.cloudfront.net
July 8, 2016

server-52-84-125-142.iad16.r.cloudfront.net
July 8, 2016

server-52-85-131-198.iad53.r.cloudfront.net
July 7, 2016

server-52-84-125-104.iad16.r.cloudfront.net
July 4, 2016

server-52-84-125-100.iad16.r.cloudfront.net
July 4, 2016

server-52-84-125-83.iad16.r.cloudfront.net
July 4, 2016

server-52-84-125-41.iad16.r.cloudfront.net
July 4, 2016

server-52-84-125-19.iad16.r.cloudfront.net
July 4, 2016

server-52-84-125-17.iad16.r.cloudfront.net
July 4, 2016

server-52-84-125-190.iad16.r.cloudfront.net
July 4, 2016

server-52-84-125-188.iad16.r.cloudfront.net
July 4, 2016

server-52-85-131-223.iad53.r.cloudfront.net
July 3, 2016

server-52-85-131-249.iad53.r.cloudfront.net
July 1, 2016

server-52-85-131-235.iad53.r.cloudfront.net
July 1, 2016

server-52-85-131-143.iad53.r.cloudfront.net
July 1, 2016

server-52-85-131-125.iad53.r.cloudfront.net
July 1, 2016

server-52-85-131-116.iad53.r.cloudfront.net
July 1, 2016

server-52-85-131-78.iad53.r.cloudfront.net
July 1, 2016

server-52-85-131-70.iad53.r.cloudfront.net
July 1, 2016

server-52-85-131-39.iad53.r.cloudfront.net
July 1, 2016

server-52-85-142-74.iad12.r.cloudfront.net
May 24, 2016

server-52-85-142-18.iad12.r.cloudfront.net
May 24, 2016

server-52-85-142-246.iad12.r.cloudfront.net
May 24, 2016

server-52-85-142-194.iad12.r.cloudfront.net
May 24, 2016

 
Showing 30 of 92 IP Addresses

File downloads found at URLs served by sub.frogyearleap.com.

26 / 68    (Adware)

The following 56 files have been seen to comunicate with sub.frogyearleap.com in live environments.

 
Latest 20 of 149 files

URL:
http://sub.frogyearleap.com/

Network:
Amazon Cloudfront

Web server:
nginx