Help RSS API Feed Maltego Contact                        

Domain > ciudad.com.ar

More information on this domain is in AlienVault OTX

Is this malicious?

Files that talk to ciudad.com.ar

MD5A/V
d2f2c9e7b5d32c5114a2f8511d9efcc2
8853f5fd8f3fd57284ad4c702fcb40a1[Win32/Zbot.G] [W32/Ramnit.C] [Virus*Win32/Ramnit.P] [W32.Ramnit-1]
3fb83eaf2a665f71ac2065f5f6956d50[HW32.CDB.5da2] [Packed.Win32.Katusha.1!O] [Trojan.Win32.Hlux.cynagk] [Trojan.FakeAV] [Kryptik.CDQY] [Win32/Kelihos.GeEUUIB] [Backdoor.Win32.Hlux.dqkq] [Backdoor.Hlux!m6CCC6SKjdo] [Win32.Backdoor.Hlux.Lose] [Backdoor.Win32.Hlux.DUHE] [Trojan.Packed.26581] [Trojan[Backdoor]/Win32.Hlux] [Win32.Hack.Hlux.dq.(kcloud)] [Backdoor:Win32/Kelihos.F] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Trojan.Crypt_s] [W32/Hlux.BWUN!tr.bdr] [Crypt_s.GNC] [Backdoor.Win32.Hlux.aDM]
a472f9d1a78fa6cb3eb6896d9c319726[TrojanDownloader.Cutwail.bs] [Backdoor.Bot] [Riskware] [Trojan.Win32.Pushdo.btelgd] [WS.Reputation.1] [BKDR_PUSHDO.FC] [Backdoor.Win32.Pushdo.qgz] [Backdoor.Pushdo!+jNmAzmKgNc] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Win32.HeurC.KVMH004.a.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor/Win32.Pushdo] [W32/Backdoor.RMSR-3833] [Trojan.CryptHWZ] [W32/Pushdo.QGZ!tr.bdr] [Crypt.CHWZ] [Trj/Pushdo.L]
ddeca0855c9bb584c270ff6c5f0521c2[Artemis!DDECA0855C9B] [WS.Reputation.1] [Backdoor.Win32.Pushdo.qij] [UnclassifiedMalware] [TR/Dldr.Cutwail.4] [TrojanDownloader:Win32/Cutwail] [Win32/Wigon.PH] [W32/Kryptik.AX!tr] [Trj/CI.A]
1de1e523afa41804295a043807d1641e
165f5084043893cc35334b568d0f6ec0[HW32.CDB.73df] [Packed.Win32.Katusha.3!O] [Win32.Malware!Drop] [Backdoor.Hlux!tc7SLh6zR0c] [WS.Reputation.1] [Kryptik.CCFN] [UnclassifiedMalware] [Backdoor:Win32/Kelihos] [Heur.Trojan.Hlux] [Win32/Kryptik.CBNK] [Backdoor.Win32.Kelihos] [W32/Kryptik.BD!tr] [Crypt_s.GPC] [Backdoor.Win32.Hlux.aBgj] [Win32/Trojan.337]
57be65340d0a4336f525d108862ccf50
8b7c5fe0eaad467bb999a2c1f7dd7486[TrojanDownloader.Cutwail] [Backdoor.Bot] [Riskware] [Trojan.Win32.Pushdo.btaipu] [W32.Pilleuz] [TROJ_CUTWAIL.CNA] [Win32.Trojan] [Backdoor.Win32.Pushdo.qhe] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Win32.HeurC.KVMH004.a.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor/Win32.Pushdo] [W32/Backdoor.IQVD-6602] [Trojan.CryptILH] [W32/Pushdo.QHE!tr.bdr] [Crypt.CILH] [Trj/Pushdo.L]
d3be3c4282a9d5158080d8023e5f2efa[TrojanRansom.Foreign.cyzc] [Fake-Rena-FNQ!D3BE3C4282A9] [Trojan.Inject.RRE] [Trojan] [WS.Reputation.1] [TROJ_RANSOM.FCN] [Trojan-Ransom.Win32.Foreign.cyzc] [UnclassifiedMalware] [Trojan.PWS.Panda.547] [TR/Ransom.Foreign.cyzc] [Win32.Troj.Undef.(kcloud)] [VirTool:Win32/Injector] [Trojan/Win32.Foreign] [W32/Trojan.CVXL-5426] [Virus.Win32.Cryptor] [W32/Injector.ZVR!tr] [Win32/Cryptor] [Trj/Dtcontx.E]
6502921b8928a37df0f0f412d10a7486[HW32.CDB.0650] [Malware.Packer.FFS] [Trojan/Win32.Symmi]
e5b85688fcbb1c799ee2e233fb531297[TrojanDownloader.Cutwail] [RDN/Downloader.a!mv] [Trojan.Inject.RRE] [Riskware] [W32.Pilleuz] [Win32/Cutwail.CGbKVWC] [BKDR_PUSHDO.FT] [Backdoor.Win32.Pushdo.qnv] [Backdoor.Pushdo!XnUVfC93BRo] [UnclassifiedMalware] [BackDoor.Bulknet.958] [BDS/Pushdo.qnv] [Backdoor/Pushdo.aew] [Win32.Hack.Pushdo.q.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [W32/Backdoor.YDLC-0133] [Backdoor.Pushdo] [Malware.Pilleuz!rem] [Trojan-Downloader.Win32.Cutwail] [W32/Pushdo.YOY!tr]
7e265cfaa3a92f9b07c518dcbe577262[Crypt_s.BOF] [TrojanDownloader*Win32/Cutwail.BS]
ea21595001334cf75d1f82adadaefb20
b4f310f5cc7b9cd68d919d50a8415974[HW32.Laneul.zqwg] [Trojan/W32.Jorik.40448.U] [TrojanDownloader.Cutwail] [Trojan] [Trojan.Win32.Jorik.byfbdv] [W32.Pilleuz] [Win32/Cutwail.RfLHODC] [TROJ_SPNR.0BGS13] [Trojan.Win32.Jorik.Cutwail.prm] [Trojan.Cutwail!Vn3uTMMB5CM] [UnclassifiedMalware] [BackDoor.Bulknet.958] [TR/Graftor.103216] [Win32.Troj.Undef.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Client-SMTP.40448.A] [Dropper/Win32.Vidro] [BScope.Trojan.Pushdo] [Malware.Pilleuz!rem] [Trojan-Downloader.Win32.Cutwail] [W32/Pushdo.YOY!tr] [SHeur4.BNRB] [Trj/CI.A] [TrojanDownloader*Win32/Cutwail.BS]
bf4fa138741ec4af0a0734b28142f7ae[Crypt2.BLVD] [TrojanDownloader*Win32/Cutwail.BS]
ea5a2c72517c76e822324540ec9f1f7a[TrojanDownloader.Cutwail] [Trojan/Wigon.ph] [Riskware] [Trojan.Win32.XPACK.bgffjt] [W32.Pilleuz] [TROJ_WIGON.AW] [UnclassifiedMalware] [BackDoor.Bulknet.739] [Heuristic.BehavesLike.Win32.Suspicious.D] [Troj/WIGON-A] [TrojanDownloader:Win32/Cutwail.BW] [W32/Trojan.JDWF-4093] [Dropper/Win32.Dorifel] [Malware.Pilleuz!rem] [Win32/Wigon.PH] [Trojan.SuspectCRC] [W32/Wigon.PH] [SHeur4.AZVH]
f7dd2cdcc0b90b7d7b2ff3cfb540c796[Cutwail-FBYD!F7DD2CDCC0B9] [Trojan.PPush] [Trojan.Win32.Bulknet.brrije] [TROJ_DLOAD.RC] [Trojan.Kryptik!QNluqFEr0aI] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Troj/Cutwail-AM] [Win32.HeurC.KVMH004.a.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Trojan.CryptDTE] [Crypt.CDTE] [Trj/CI.A]
63e2d975b940af1a4ae7c80f7f6f7052[TrojanDownloader*Win32/Cutwail.BS]
f0eec37a33ad2efee7080820ec596e83[Win.Trojan.Ransom-2439]

Whois

PropertyValue
Email minuchinl@nic.gob.ar

DNS Resolutions

DateIP Address
2010-01-28200.42.97.108 (ClassC)
2010-01-31200.42.97.107 (ClassC)
2010-04-04200.42.96.23 (ClassC)
2013-08-27200.42.143.77 (ClassC)
2013-10-26200.42.143.77 (ClassC)
2014-08-23200.42.143.39 (ClassC)
2014-09-18200.42.138.152 (ClassC)
2014-09-18200.42.138.141 (ClassC)
2014-11-14200.42.143.35 (ClassC)
2015-02-04200.42.96.68 (ClassC)
2023-08-04104.18.78.48 (ClassC)
2025-05-083.33.147.52 (ClassC)
2025-08-0715.197.131.201 (ClassC)

Port 443

Subdomains

DateDomainIP
mta4.ciudad.com.ar2014-07-08200.42.138.144
ubbi.ciudad.com.ar2025-06-30200.42.24.104
webmail.ciudad.com.ar2024-12-2220.190.190.193
ads.ciudad.com.ar2025-05-10104.18.69.59
cdn-front.ciudad.com.ar2025-05-10104.18.70.59
www.ciudad.com.ar2014-06-29200.42.143.77
View on OTX | View on ThreatMiner








Data with thanks to AlienVault OTX, VirusTotal, Malwr and others. [Sitemap]



� Copyright 2019 AlienVault, Inc. | Legal| Status| Do Not Sell My Personal Information