get.okozo.com

Domains By Proxy, LLC  (Proxy Registrant)

Domain Information

The domain get.okozo.com is registered by proxy through GODADDY.COM, LLC and was originally registered in February of 2007. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Ashburn, Virginia within the United States which resides on the Amazon Technologies Inc. network. The domain uses the Amazon Cloudfront CDN service which utilizes a number of proxy IP Addresses (see below).
Registrar:
GODADDY.COM, LLC

Server location:
Virginia, United States (US)

Create date:
Saturday, February 10, 2007

Expires date:
Friday, February 10, 2017

Updated date:
Thursday, February 11, 2016

ASN:
AS16509 AMAZON-02 - Amazon.com, Inc.

Root domain:

Google Safe Browsing:
unwanted

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Dr.Web
Adware.W3i.9, Adware.Downware.2220, Adware.Downware.644
100.00%

VIPRE Antivirus
InstallIQ Installer, DownloadAdmin
100.00%

ESET NOD32
Win32/InstallIQ (variant), Win32/DownloadAdmin.G potentially unwanted, Win32/InstallIQ potentially unwanted (variant)
100.00%

AVG
AdInstaller.InstallQ, Generic, Skodna.Bundle
100.00%

K7 AntiVirus
Unwanted-Program
100.00%

Sophos
InstallQ, Download Admin
100.00%

Reason Heuristics
PUP.Installer.W3i.N, PUP.Installer.W3i.G, PUP.Installer.Tightrope, PUP.Bundler.Tightrope, Threat.InstallX.Installer, PUP.InstallX.W3i.Installer (M)
100.00%

avast!
Win32:DownloadAdmin-K [PUP], Win32:Adware-gen [Adw]
85.71%

NANO AntiVirus
Riskware.Nsis.Downware.dlgjls, Trojan.Win32.Downware.bwdcbn, Trojan.Win32.Agent.dijopq
85.71%

Comodo Security
UnclassifiedMalware, Application.Win32.InstallIQ.NTZK
71.43%

Malwarebytes
PUP.Optional.InstallIQ.A, PUP.DownloadAdmin
57.14%

Trend Micro House Call
HV_INSTALLIQ_CA0836BD.TOMC, TROJ_GEN.F47V0702, TROJ_GEN.R0CBH0AJI13
57.14%

Baidu Antivirus
Trojan.Win32.InstallIQ, Trojan.Win32.Agent, Adware.Win32.InstallIQ
57.14%

Fortinet FortiGate
Adware/InstallIQ, Riskware/DownloadAdmin, Riskware/InstallIQ
57.14%

McAfee
Artemis!8F8C7B40756B, Artemis!5D46A7DCDBF5, Artemis!812F11602259
57.14%

The domain get.okozo.com has been seen to resolve to the following 40 IP addresses.

server-52-85-131-164.iad53.r.cloudfront.net
May 18, 2016

server-52-85-131-150.iad53.r.cloudfront.net
May 18, 2016

server-52-85-131-107.iad53.r.cloudfront.net
May 18, 2016

server-52-85-131-101.iad53.r.cloudfront.net
May 18, 2016

server-52-85-131-67.iad53.r.cloudfront.net
May 18, 2016

server-52-85-131-45.iad53.r.cloudfront.net
May 18, 2016

server-52-85-131-239.iad53.r.cloudfront.net
May 18, 2016

server-52-85-131-222.iad53.r.cloudfront.net
May 18, 2016

server-54-230-102-188.iad2.r.cloudfront.net
April 17, 2016

server-54-230-102-182.iad2.r.cloudfront.net
April 17, 2016

server-54-230-102-156.iad2.r.cloudfront.net
April 17, 2016

server-54-230-102-149.iad2.r.cloudfront.net
April 17, 2016

server-54-230-102-136.iad2.r.cloudfront.net
April 17, 2016

server-54-230-102-70.iad2.r.cloudfront.net
April 17, 2016

server-54-230-102-16.iad2.r.cloudfront.net
April 17, 2016

server-54-230-102-240.iad2.r.cloudfront.net
April 17, 2016

server-54-230-192-74.iad53.r.cloudfront.net
July 12, 2015

server-54-192-194-217.iad53.r.cloudfront.net
July 12, 2015

server-54-192-194-33.iad53.r.cloudfront.net
July 12, 2015

server-54-192-194-27.iad53.r.cloudfront.net
July 12, 2015

server-54-192-194-25.iad53.r.cloudfront.net
July 12, 2015

server-54-192-192-153.iad53.r.cloudfront.net
July 12, 2015

server-54-192-192-110.iad53.r.cloudfront.net
July 12, 2015

server-54-230-192-129.iad53.r.cloudfront.net
July 12, 2015

server-54-230-36-151.jfk1.r.cloudfront.net
May 4, 2015

server-54-192-38-45.jfk1.r.cloudfront.net
May 4, 2015

server-54-230-38-47.jfk1.r.cloudfront.net
May 4, 2015

server-54-230-38-2.jfk1.r.cloudfront.net
May 4, 2015

server-54-230-37-81.jfk1.r.cloudfront.net
May 4, 2015

server-54-192-38-41.jfk1.r.cloudfront.net
May 4, 2015

 
Showing 30 of 40 IP Addresses

File downloads found at URLs served by get.okozo.com.

44 / 68    (Adware)
http://get.okozo.com/hamster.exe  (812f116022598191aea93d17b67cf293)

1 / 68      (Adware)
http://get.okozo.com/digital-alarm-clock.exe  (b9ef4120a8e23bc2b3d130efbc16ced4)

18 / 68    (Adware)
http://get.okozo.com/3ddigitalclock-setup.exe  (b1df2972fd96cf1ab9e54cb421f80985)

18 / 68    (Adware)

20 / 68    (Adware)
http://get.okozo.com/cc-normal.exe  (f1f55f2ea8f65935a78e04511e16c76f)

14 / 68    (Adware)
http://get.okozo.com/okozodesktop-setup.exe  (8f8c7b40756b86410dbbd08b8211fc86)

8 / 68      (Adware)
http://get.okozo.com/ab-red.exe  (6d22e8b98043663977ecd8c2acb28797)

The following 15 files have been seen to comunicate with get.okozo.com in live environments.

URL:
http://get.okozo.com/

Title:
“Okozo”

Network:
Amazon Cloudfront

Web server:
AmazonS3