Report Overview

  1. Submitted URL

    huggingface.co/Ai-Tunes/modelos_publicos/resolve/main/bottaiko/macro.exe?download=true

  2. IP

    143.204.55.121

    ASN

    #16509 AMAZON-02

  3. Submitted

    2024-04-19 03:41:02

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
huggingface.co1119512016-07-182016-09-182024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumhuggingface.co/Ai-Tunes/modelos_publicos/resolve/main/bottaiko/macro.exe?download=truefiles - file ~tmp01925d3f.exe
mediumhuggingface.co/Ai-Tunes/modelos_publicos/resolve/main/bottaiko/macro.exe?download=trueIdentifies compiled AutoIT script (as EXE).

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    huggingface.co/Ai-Tunes/modelos_publicos/resolve/main/bottaiko/macro.exe?download=true

  2. IP

    143.204.55.121

  3. ASN

    #16509 AMAZON-02

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections

    Size

    916 kB (916480 bytes)

  2. Hash

    9c7c9527f675aa080f213a1455fe5c5d

    46aa35a4d2452eaa7d7a67739cf7d5523a1beb63

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
huggingface.co/Ai-Tunes/modelos_publicos/resolve/main/bottaiko/macro.exe?download=true
143.204.55.121200 OK916 kB