Report Overview

  1. Submitted URL

    raw.githubusercontent.com/jakobfriedl/precompiled-binaries/main/Token/JuicyPotato.exe

  2. IP

    185.199.111.133

    ASN

    #54113 FASTLY

  3. Submitted

    2024-04-20 04:59:43

    Access

    public

  4. Website Title

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/jakobfriedl/precompiled-binaries/main/Token/JuicyPotato.exeDetects different hacktools based on their imphash
mediumraw.githubusercontent.com/jakobfriedl/precompiled-binaries/main/Token/JuicyPotato.exeDetects win.juicy_potato.

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/jakobfriedl/precompiled-binaries/main/Token/JuicyPotato.exe

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32+ executable (console) x86-64, for MS Windows, 7 sections

    Size

    348 kB (347648 bytes)

  2. Hash

    808502752ca0492aca995e9b620d507b

    668c40bb6c792b3502b4eefd0916febc8dbd5182

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects different hacktools based on their imphash
    Malpedia's yara-signator rulesmalware
    Detects win.juicy_potato.
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/jakobfriedl/precompiled-binaries/main/Token/JuicyPotato.exe
185.199.110.133 348 kB