The domain download.getlinksinaseconds.com is registered by proxy through IP MIRROR PTE LTD. DBA IP MIRROR and was originally registered in January of 2014. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the CloudFlare, Inc. network. The domain uses the CloudFlare CDN, a distributed domain name server service which utilizes a number of reverse proxy IP Addresses (see below).
Registrant:
Premium Registration Service
Registrar:
IP MIRROR PTE LTD. DBA IP MIRROR
Server location:
New York, United States (US)
Create date:
Saturday, January 18, 2014
Expires date:
Wednesday, January 18, 2017
Updated date:
Wednesday, January 6, 2016
ASN:
AS13335 CLOUDFLARENET - CloudFlare, Inc.
Scanner detections:
Detections (100% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.Installer.ShetefSolutionsConsulting1998.r, PUP.Installer.Amonetizeltd.?, PUP.Installer.Amonetizeltd.V, PUP.Installer.Amonetizeltd.j, PUP.Installer.ShetefSolutionsConsulting1998.q, Threat.Win.Reputation.IMP, (M), PUP.Amonetize.Bundler, Adware.Amonetize.Installer.Meta (M), Adware.Amonetize.Meta (M)
90.48%
Avira AntiVirus
ADWARE/Adware.Gen2, W32/Ramnit.C
80.95%
AhnLab V3 Security
PUP/Win32.Amonetiz, Win32/Ramnit.J
76.19%
Malwarebytes
PUP.Optional.InstallMonetizer, PUP.Optional.Amonetize, PUP.Optional.Amonetize.A, Virus.Ramnit
73.81%
McAfee
Artemis!4C74A1B1E4C3, Adware-Amonetize!75E6A6BEB316, Adware-Amonetize!D10282E7955B, Artemis!840C22594669, Adware-Amonetize!67C4C188D54D, Artemis!ED772E252D7D, Artemis!08D64DBFFD39, Artemis!B0A532E757C6, Artemis!099A6DA8018F, Artemis!3A889694EB1D, Artemis!DBB0C1568950, RDN/Generic PUP.x!bxh, Artemis!3E6E4C7DDD35, Artemis!19A4AAB76876, Artemis!D398895D0274, PUP-FBM!B33B775D7BCE, PUP-FBM!9402B657FEA1, PUP-FBM!28A121E0E10D, Artemis!72441581105A, Adware-Amonetize!AA2FDD8D837D
71.43%
Trend Micro House Call
TROJ_GEN.F47V0123, TROJ_GEN.F47V0128, TROJ_GEN.F47V0130, TROJ_GEN.F47V0121, TROJ_GEN.F47V0205, TROJ_GEN.F47V0218, TROJ_GEN.F47V0220
69.05%
ESET NOD32
Win32/Amonetize.AD (variant), Win32/Amonetize.AG (variant), Win32/Amonetize.AI (variant), Win32/Amonetize.AJ (variant), Win32/Amonetize.AO (variant)
69.05%
avast!
Win32:Amonetize-E [PUP], Win32:Amonetize-F [PUP], Win32:Adware-BJY [PUP], Win32:Amonetize-N [PUP], Win32:Amonetize-Y [PUP]
64.29%
VIPRE Antivirus
Amonetize, Trojan.Win32.Generic, Trojan-Downloader.Win32.Agent, Virus.Win32.Ramnit.b
64.29%
Sophos
Amonetize, W32/Ramnit-A
61.90%
Dr.Web
Adware.Downware.1575, Adware.Downware.1833, Adware.Downware.2083, Adware.Downware.1655, Adware.Downware.2467, Adware.Downware.3925
59.52%
Fortinet FortiGate
Riskware/Amonetize, W32/Ramnit.C, Adware/Amonetize
47.62%
Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize, not-a-virus:Downloader.Win32.Agent, Virus.Win32.Nimnul, not-a-virus:AdWare.Win32.Amonetize
42.86%
AVG
Generic_r, MalSign.Generic, MalSign.Wilmo, Win32/Zbot.G, BundleApp_r.R
35.71%
Baidu Antivirus
Adware.Win32.Amonetize, Virus.Win32.Nimnul.$a
35.71%
The domain download.getlinksinaseconds.com has been seen to resolve to the following 8 IP addresses.
cf-199-27-135-104.cloudflare.com
June 20, 2014
cf-199-27-134-104.cloudflare.com
June 20, 2014
cf-199-27-134-211.cloudflare.com
March 13, 2014
cf-199-27-135-211.cloudflare.com
March 13, 2014
File downloads found at URLs served by download.getlinksinaseconds.com.
Latest 30 of 180 download URLs
URL:
http://download.getlinksinaseconds.com/
SSL certificate subject:
CN=sni65186.cloudflaressl.com, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated
SSL certificate issuer:
CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
Web server:
cloudflare-nginx