Report Overview

  1. Submitted URL

    raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/freebobux-source.zip

  2. IP

    185.199.108.133

    ASN

    #54113 FASTLY

  3. Submitted

    2024-04-19 08:45:04

    Access

    public

  4. Website Title

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/freebobux-source.zip

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    504 kB (504177 bytes)

  2. Hash

    63bd9f0354349c445f48a337c05b11e8

    f80667215b9ca4c4de64979efaaf6aff4208afa0

  1. Archive (3)

  2. FilenameMd5File type
    CLWCP.exe
    e62ee6f1efc85cb36d62ab779db6e4ec
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
    bg.bmp
    2229bdea09783e544015db10917ea91c
    PC bitmap, Windows 3.x format, 1366 x 768 x 24, image size 3148800, resolution 4724 x 4724 px/m, cbSize 3148854, bits offset 54
    freebobux.bat
    202d76eb2952aeb2e241c13defe48045
    DOS batch file, ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/freebobux-source.zip
185.199.109.133 504 kB