Report Overview

  1. Submitted URL

    raw.githubusercontent.com/P-DennyGamingYT/Cat-Spoof/main/Update.zip

  2. IP

    185.199.110.133

    ASN

    #54113 FASTLY

  3. Submitted

    2024-05-10 22:07:20

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-05-09

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/P-DennyGamingYT/Cat-Spoof/main/Update.zip

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    20 MB (20353408 bytes)

  2. Hash

    3e02eca6806f49bbf449de8cafc5f644

    cd3c9638a17b9fee1a8745e0fab5d1d090cb5188

  1. Archive (8)

  2. FilenameMd5File type
    Cat Spoof.exe
    4ce47ddf3606f387447444db1211a512
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Cat Spoof.exe.config
    224a6d94b8176847a9a72bb7133bef14
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    Bunifu.Licensing.dll
    1a45c5f35d5a5b3bf94f01caae45a641
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Bunifu.UI.WinForms.1.5.3.dll
    b4280d2898d92ab5c3911f0305d7672f
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Cat Spoof.pdb
    75a9982c9dc3d242c2a1e18f56c32d50
    MSVC program database ver 7.00, 512*135 bytes
    config.ini
    502df57b122361ebff9fa485678d4b85
    ASCII text, with CRLF line terminators
    DarkUI.dll
    cb1f7943a7c3cb991ec67d0374c1c591
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Siticone.UI.dll
    750c58af2e56b6addecffcf152520ab8
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects ConfuserEx packed file
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/P-DennyGamingYT/Cat-Spoof/main/Update.zip
185.199.109.133200 OK20 MB