Help RSS API Feed Maltego Contact                        

Domain > injersey.com

More information on this domain is in AlienVault OTX

Is this malicious?

Files that talk to injersey.com

MD5A/V
5e5f2ba73005a54ea71e591feff2b1d7[Artemis!5E5F2BA73005] [Trojan.Win32.Jorik.Cutwail.pgy]
ddeca0855c9bb584c270ff6c5f0521c2[Artemis!DDECA0855C9B] [WS.Reputation.1] [Backdoor.Win32.Pushdo.qij] [UnclassifiedMalware] [TR/Dldr.Cutwail.4] [TrojanDownloader:Win32/Cutwail] [Win32/Wigon.PH] [W32/Kryptik.AX!tr] [Trj/CI.A]
64d63f2465d931818539beff1ca66a34[Crypt2.AATE] [TR/Rogue.1134088]
2263766e2732eb5e6eb78b5d35423883[Crypt2.BTUL] [TrojanDownloader*Win32/Cutwail.BS]
2422279645dc3f8f9201bf042122d6d5[W32.Clod317.Trojan.772f] [Backdoor/W32.Pushdo.36280.C] [Trojan.Cutwail.AQ] [Trojan.Win32.XPACK.bdjuve] [W32.Pilleuz] [Pushdo.B] [TROJ_CUTWAIL.KK] [Trojan.Wigon!3W+DBvqt2Q0] [Backdoor.Win32.A.Pushdo.36280.A] [UnclassifiedMalware] [Trojan.DownLoad3.17030] [Heuristic.BehavesLike.Win32.Suspicious-DTR.K] [Troj/FakeAV-GDI] [Backdoor/Pushdo.dr] [Win32.Hack.Pushdo.(kcloud)] [TrojanDownloader:Win32/Cutwail.BW] [Trojan/Win32.Zbot] [Backdoor.Pushdo] [Backdoor.Win32.Pushdo] [W32/CutMail.EE!tr] [SHeur4.ATIK] [Trojan.Win32.Kryptik.aN]
3b54013dbac240d454b929a3745a46e4[Artemis!3B54013DBAC2] [WS.Reputation.1] [HB_Pushdo-1] [Trojan.Win32.Jorik.Cutwail.ppt] [UnclassifiedMalware] [BackDoor.Bulknet.958] [W32/Pushdo.YOY!tr] [SHeur4.BMTZ]
8b7c5fe0eaad467bb999a2c1f7dd7486[TrojanDownloader.Cutwail] [Backdoor.Bot] [Riskware] [Trojan.Win32.Pushdo.btaipu] [W32.Pilleuz] [TROJ_CUTWAIL.CNA] [Win32.Trojan] [Backdoor.Win32.Pushdo.qhe] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Win32.HeurC.KVMH004.a.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor/Win32.Pushdo] [W32/Backdoor.IQVD-6602] [Trojan.CryptILH] [W32/Pushdo.QHE!tr.bdr] [Crypt.CILH] [Trj/Pushdo.L]
d38a3646d932d062528aea48d2122315
ea21595001334cf75d1f82adadaefb20
b4f310f5cc7b9cd68d919d50a8415974[HW32.Laneul.zqwg] [Trojan/W32.Jorik.40448.U] [TrojanDownloader.Cutwail] [Trojan] [Trojan.Win32.Jorik.byfbdv] [W32.Pilleuz] [Win32/Cutwail.RfLHODC] [TROJ_SPNR.0BGS13] [Trojan.Win32.Jorik.Cutwail.prm] [Trojan.Cutwail!Vn3uTMMB5CM] [UnclassifiedMalware] [BackDoor.Bulknet.958] [TR/Graftor.103216] [Win32.Troj.Undef.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Client-SMTP.40448.A] [Dropper/Win32.Vidro] [BScope.Trojan.Pushdo] [Malware.Pilleuz!rem] [Trojan-Downloader.Win32.Cutwail] [W32/Pushdo.YOY!tr] [SHeur4.BNRB] [Trj/CI.A] [TrojanDownloader*Win32/Cutwail.BS]
622bf7ba2317ae03b0682a650bac03d8[TrojanDownloader.Cutwail] [Cutwail-FBPN!622BF7BA2317] [W32.Pilleuz] [Pushdo.I] [TROJ_SPNR.1ADR13] [Backdoor.Win32.Pushdo.pyz] [Backdoor.Pushdo!kokJ8DxObyw] [Heur.Suspicious] [BackDoor.Bulknet.893] [Win32.Hack.Pushdo.p.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor.Win32.U.Pushdo.41472] [Backdoor/Win32.Pushdo] [W32/Backdoor.PJEO-2224] [Backdoor.Pushdo] [Malware.Pilleuz!rem] [Trojan-Downloader.Win32.Cutwail] [W32/Pushdo.PYZ!tr.bdr] [SHeur4.BGUF] [Trj/OCJ.D]
680438c58773658c1905d58c040f78d4[VirTool*Win32/Injector.CL]
bf4fa138741ec4af0a0734b28142f7ae[Crypt2.BLVD] [TrojanDownloader*Win32/Cutwail.BS]
adb2144bf4609f36ac6baf5fd0a661c2[Downloader.Small.IVW]
06d40abb65ee157ff2574df8d24743f1
9377d78f1f97104f41a6b42b195c8e51[SHeur4.BLZU]
89c64a4ee7b13dd2dbdcf4a05f71312a[TrojanDownloader*Win32/Cutwail.BS]
1d309b266dbe76d86b01314a65c97cce[HW32.CDB.8c27] [Trojan.Kryptik!/yxP5762iCg] [Kryptik.CCFN] [Trojan.Win32.Kryptik.cxmihh] [UnclassifiedMalware] [Trojan.Packed.26527] [Win32.Troj.Undef.(kcloud)] [Backdoor:Win32/Kelihos] [W32/Trojan.LLHB-6858] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Backdoor.Win32.Kelihos] [W32/Hlux.BWUN!tr.bdr] [Crypt_s.GKU] [Trojan.Win32.Kryptik.CAHC]
43415b6d9537a142cec2c22c31f8bfae[Cutwail-FBYD!43415B6D9537] [Backdoor.Pushdo] [Backdoor.Win32.Pushdo.qev] [Trojan.Kryptik!NPQTFtfoX4A] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Artemis!43415B6D9537] [TrojanDownloader:Win32/Cutwail] [Trojan.CryptCQK] [W32/Pushdo.QEV!tr.bdr] [Crypt.CCQK] [Trj/Dtcontx.E]
82d62080e472af17170f4752ebd4ebd1[W32.Pilleuz] [Pushdo.G] [Backdoor.Win32.Pushdo.pwz] [Heur.Suspicious] [BackDoor.Bulknet.847] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor.Win32.S.Pushdo.36864] [W32/Backdoor.SFNI-6924] [Malware.Pilleuz!rem] [Win32/Wigon.PH] [Trojan.Crypt] [W32/Pushdo.PWZ!tr.bdr] [SHeur4.BFXO]

Whois

PropertyValue
Email DOMAIN-REGISTRANT@GMTI.GANNETT.COM
NameServer NS2.INFI.NET
Created 1994-12-29 00:00:00
Changed 2016-11-26 00:00:00
Expires 2017-12-28 00:00:00
Registrar MARKMONITOR INC.

DNS Resolutions

DateIP Address
2013-06-19159.54.242.139 (ClassC)
2025-01-07159.54.242.176 (ClassC)
2025-04-30100.28.104.175 (ClassC)
2025-07-2454.157.108.158 (ClassC)
2025-08-0698.83.184.133 (ClassC)

Port 80

Subdomains

DateDomainIP
woodbridge.injersey.com2025-04-14100.28.104.175
fishing.injersey.com2024-08-27159.54.242.176
randolph.injersey.com2024-10-12159.54.242.176
florhampark.injersey.com2024-09-02159.54.242.176
cherryhill.injersey.com2024-09-19159.54.242.176
gcirm.injersey.com2025-04-2998.83.184.133
www.gcirm.injersey.com2024-09-22159.54.242.176
morristown.injersey.com2024-08-15159.54.242.176
ads.injersey.com2025-04-14100.28.104.175
www.ads.injersey.com2025-04-1298.83.184.133
www.injersey.com2025-03-27100.28.104.175
View on OTX | View on ThreatMiner








Data with thanks to AlienVault OTX, VirusTotal, Malwr and others. [Sitemap]



� Copyright 2019 AlienVault, Inc. | Legal| Status| Do Not Sell My Personal Information