Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
Title | LukeAcha.com |
Description | What’s on this Malware analysis, tools, decoders and |
Keywords | .Net Backdoor, Malware, Jupyter, Infostealer, Emotet, Trickbot, Hworm, analysis, Python, YARA, OpenIOC |
WebSite | lukeacha.com |
Host IP | 74.208.236.248 |
Location | United States |
Site | Rank |
US$1,592
Last updated: 2023-05-14 00:52:06
lukeacha.com has Semrush global rank of 0. lukeacha.com has an estimated worth of US$ 1,592, based on its estimated Ads revenue. lukeacha.com receives approximately 183 unique visitors each day. Its web server is located in United States, with IP address 74.208.236.248. According to SiteAdvisor, lukeacha.com is safe to visit. |
Purchase/Sale Value | US$1,592 |
Daily Ads Revenue | US$1 |
Monthly Ads Revenue | US$44 |
Yearly Ads Revenue | US$529 |
Daily Unique Visitors | 12 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
lukeacha.com. | A | 3600 | IP: 74.208.236.248 |
lukeacha.com. | NS | 86400 | NS Record: ns1032.ui-dns.org. |
lukeacha.com. | NS | 86400 | NS Record: ns1032.ui-dns.biz. |
lukeacha.com. | NS | 86400 | NS Record: ns1032.ui-dns.de. |
lukeacha.com. | NS | 86400 | NS Record: ns1032.ui-dns.com. |
lukeacha.com. | MX | 3600 | MX Record: 10 mx00.1and1.com. |
lukeacha.com. | MX | 3600 | MX Record: 10 mx01.1and1.com. |
Home Blog Downloads Links About Malware Analysis and Detect Response Malware analysis isn’t just part of a job, it’s a hobby. Like many in the field of DFIR, I find that playing with samples, looking at obfuscation and reversing engineering is fun. Many Practitioners feel that sharing with the community is important. I also feel that sharing samples, detection techniques and indicators is an important public service. Hopefully the content in this site is found to be useful analysts who happen to come upon this page. What’s on this site? I won’t host any samples on this site, I will have however share indicators, and links to public sandbox runs and virustotal pages. On the blog I will attempt to provide some detailed analysis of samples and alert data. In the Downloads section I will provide some custome decoder scripts for many of the DOSfuscation and Powershell obfuscation techniques I’ve observed from Emotet and Trickbot type campaigns. Watch in the future for some CTF challenges |
HTTP/1.1 200 OK Content-Type: text/html Content-Length: 3613 Connection: keep-alive Keep-Alive: timeout=15 Date: Wed, 22 Dec 2021 11:15:48 GMT Server: Apache Last-Modified: Sun, 17 Jan 2021 19:13:45 GMT ETag: "e1d-5b91d677d2c40" Accept-Ranges: bytes |
Domain Name: LUKEACHA.COM Registry Domain ID: 1455016552_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.ionos.com Registrar URL: http://www.ionos.com Updated Date: 2021-04-22T07:34:07Z Creation Date: 2008-04-21T21:12:45Z Registry Expiry Date: 2022-04-21T21:12:45Z Registrar: IONOS SE Registrar IANA ID: 83 Registrar Abuse Contact Email: abuse@ionos.com Registrar Abuse Contact Phone: +1.6105601459 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: NS1032.UI-DNS.BIZ Name Server: NS1032.UI-DNS.COM Name Server: NS1032.UI-DNS.DE Name Server: NS1032.UI-DNS.ORG DNSSEC: unsigned >>> Last update of whois database: 2021-12-25T07:48:57Z <<< |