Report Overview

  1. Submitted URL

    gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40274.zip

  2. IP

    172.65.251.78

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-20 01:29:24

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
gitlab.com177192004-01-152014-06-062024-04-19

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40274.zip

  2. IP

    172.65.251.78

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    15 kB (15033 bytes)

  2. Hash

    8e62a5b5240171c8239c54622ea7a3e4

    3a008ebb8b357a5e4d4017923be93fce51e235a2

  1. Archive (12)

  2. FilenameMd5File type
    ELBO.config
    4a5585ca075cbabb7045fe5f08415125
    ASCII text, with very long lines (506), with CRLF line terminators
    ._ELBO.config
    3e0a6dac0c81bd5a795085d3423f7b51
    AppleDouble encoded Macintosh file
    eligiblebombshell_1.2.0.1.py
    4192f86dfea75943ca34b3fab937422c
    Python script, ASCII text executable
    ._eligiblebombshell_1.2.0.1.py
    3e0a6dac0c81bd5a795085d3423f7b51
    AppleDouble encoded Macintosh file
    shellcode.py
    698373955a56edaa70c4b3f7001ee3f4
    ASCII text, with very long lines (2206)
    ._shellcode.py
    3e0a6dac0c81bd5a795085d3423f7b51
    AppleDouble encoded Macintosh file
    shellcode.pyc
    31fce6fa52a9db01adf2ec18fa30b313
    python 2.3 byte-compiled
    ._shellcode.pyc
    3e0a6dac0c81bd5a795085d3423f7b51
    AppleDouble encoded Macintosh file
    ._ELBO
    3e0a6dac0c81bd5a795085d3423f7b51
    AppleDouble encoded Macintosh file
    notes.txt
    89f841b3508e960966170a119888152d
    ASCII text
    ._notes.txt
    3e0a6dac0c81bd5a795085d3423f7b51
    AppleDouble encoded Macintosh file
    ._40274
    3e0a6dac0c81bd5a795085d3423f7b51
    AppleDouble encoded Macintosh file

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    EQGRP Toolset Firewall - from files eligiblebombshell_1.2.0.1.py, eligiblebombshell_1.2.0.1.py
    Public Nextron YARA rulesmalware
    EQGRP Toolset Firewall - file shellcode.py
    Public Nextron YARA rulesmalware
    EQGRP Toolset Firewall - file shellcode.py
    Public Nextron YARA rulesmalware
    EQGRP Toolset Firewall - Unique strings
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40274.zip
172.65.251.78200 OK15 kB