Report Overview

  1. Submitted URL

    korozin.github.io/assets/downloads/code_tools/VillagerCreator.exe

  2. IP

    185.199.110.153

    ASN

    #54113 FASTLY

  3. Submitted

    2024-04-24 11:35:02

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
korozin.github.iounknown2013-03-082022-12-082023-10-19

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumkorozin.github.io/assets/downloads/code_tools/VillagerCreator.exeIdentify partial Agent Tesla strings

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    korozin.github.io/assets/downloads/code_tools/VillagerCreator.exe

  2. IP

    185.199.108.153

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    351 kB (350720 bytes)

  2. Hash

    c6ab8aa53c58b12be0f91028b278afee

    78cc527c00ff78a3956561401e5a14fde4d1f353

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Identify partial Agent Tesla strings
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
korozin.github.io/assets/downloads/code_tools/VillagerCreator.exe
185.199.108.153200 OK351 kB