Report Overview

  1. Submitted URL

    github.com/vxunderground/MalwareSourceCode/raw/main/Win32/Win32.HiddenVNCBot.2021.zip

  2. IP

    140.82.121.4

    ASN

    #36459 GITHUB

  3. Submitted

    2024-05-11 02:11:12

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    9

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com35802unknownNo dataNo data
github.com1423unknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/vxunderground/MalwareSourceCode/main/Win32/Win32.HiddenVNCBot.2021.zip

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    409 kB (408836 bytes)

  2. Hash

    8508a50faf9553eb41e70ba00483cb2b

    20d202833a2965cf9e90cd1a3698ca31e14c5861

  1. Archive (44)

  2. FilenameMd5File type
    HVNC.vcxproj
    a08887e76e2e9a076ab5a934b3f3e78d
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    HVNC.vcxproj.filters
    5e8621f134d89cbcb1e64bc25bd5bfab
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    HVNC.vcxproj.user
    244d056f5e959be6d9a2f7e94686f1c8
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    HiddenDesktop.cpp
    28178d3f72b2235a3688bc0342bf9f73
    C source, ASCII text, with CRLF line terminators
    HiddenDesktop.h
    2326eebae824b4d9197191803982d0b8
    C source, ASCII text, with CRLF line terminators
    Main.cpp
    0fed6094bb7641409ba5be94ca23a7f2
    C source, ASCII text, with CRLF line terminators
    HVNC.sln
    7a266477aefdc49fe4633bc163c85c36
    Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    README.md
    50878c619db6af22aedb21d5d2603f4a
    ASCII text
    Common.h
    5680b5a2047168bf7a6a5199e027c74c
    C source, ASCII text, with CRLF line terminators
    ControlWindow.cpp
    6f3973e31199e5f608a674eb456280b4
    C source, ASCII text, with CRLF line terminators
    ControlWindow.h
    f0b72aac2c9b5b463d7f0ada9f5ec6b0
    C source, ASCII text, with CRLF line terminators
    Main.cpp
    d0d93aa592c18e1a62862a08ac25b316
    C source, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    Server.cpp
    2ed55b4ead8aaeaf4c53403c6d3819e9
    C source, ASCII text, with CRLF line terminators
    Server.h
    63977bfae8597f5c832b0aafb29ce7c9
    C source, ASCII text, with CRLF line terminators
    Server.vcxproj
    8bc2acbddbe7749fad170cbed97f2f12
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    Server.vcxproj.filters
    d811dd056d34b9e3449709c36537512f
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    Server.vcxproj.user
    ffa2bd3c5de2a60b2a25358967040c16
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    _version.h
    c73e2e99244225c31daaaeb6454be5e3
    C source, ASCII text, with CRLF line terminators
    Client.exe
    be2d5738d08d1e4bd54155f1cb7806b2
    PE32 executable (console) Intel 80386, for MS Windows, 5 sections
    Server.exe
    9630d0e2bf6a9366717a2e7a3b270108
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    Client.exe
    5a38d9b9972844c43323c0d020d51700
    PE32+ executable (console) x86-64, for MS Windows, 7 sections
    Api.obj
    290d8e92952b10a9c5027e0959046501
    Intel 80386 COFF object file, not stripped, 296 sections, symbol offset=0x19ba8, 1351 symbols, created Tue Sep 14 19:55:38 2021, 1st section name ".drectve"
    Client.Build.CppClean.log
    6350e0a8c8b292c256a648e169b8575b
    ASCII text, with CRLF line terminators
    Client.exe.recipe
    04cb9f818136f1cb7c78b1b58fcea571
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    CL.command.1.tlog
    bf87aa1958c294deb9c2e3baef4b91c5
    Unicode text, UTF-16, little-endian text, with very long lines (559), with CRLF line terminators
    CL.read.1.tlog
    83336c29582ab5410e951286d88d930d
    Unicode text, UTF-16, little-endian text, with CRLF line terminators
    CL.write.1.tlog
    4fcdad3e88aa64153e76e1c3ac6a5905
    Unicode text, UTF-16, little-endian text, with very long lines (430), with CRLF line terminators
    Client.lastbuildstate
    693da47722884b0af3e2e5e76c4dc205
    ASCII text, with CRLF line terminators
    link.command.1.tlog
    063c069d7c0567c95dbadf919a01711e
    Unicode text, UTF-16, little-endian text, with very long lines (1131), with CRLF line terminators
    link.read.1.tlog
    1765f0108d153e85d3b2be315a94c561
    Unicode text, UTF-16, little-endian text, with very long lines (544), with CRLF line terminators
    link.write.1.tlog
    0fb61b86366b20e8f5dd76f00fb9fdaf
    Unicode text, UTF-16, little-endian text, with very long lines (544), with CRLF line terminators
    HTTP.obj
    b76e25c4159cf5d3da77bbba048b28f9
    Intel 80386 COFF object file, not stripped, 6 sections, symbol offset=0x70a6, 55 symbols, created Tue Sep 14 19:55:38 2021, 1st section name ".drectve"
    HVNC.log
    1f7a9dc73ffe06b4d2ed660d319fa748
    data
    HiddenDesktop.obj
    17d4754decb8e7cb80e0dcb1bd68a951
    Intel 80386 COFF object file, not stripped, 44 sections, symbol offset=0x1085c, 229 symbols, created Tue Sep 14 19:55:38 2021, 1st section name ".drectve"
    Api.cpp
    8d166ed4c7d5389e4e545e92a5c00ae2
    C++ source, ASCII text, with very long lines (533), with CRLF line terminators
    Api.h
    dfd30baf9392c96ec6a23ecff3ed98d2
    C++ source, ASCII text, with CRLF line terminators
    Common.h
    7cb8a835d7a8070241932e1a5a835677
    C source, ASCII text, with CRLF line terminators
    HTTP.cpp
    47644e3ceaab37780bd079be9aa9b1ee
    C source, ASCII text, with CRLF line terminators
    HTTP.h
    8c1801cc128c6f7e35b7fc95372ae4a7
    C source, ASCII text, with CRLF line terminators
    Inject.h
    413cd9b91f2f10bd8f48224927563468
    C source, ASCII text, with CRLF line terminators
    Panel.cpp
    2b66abb141ac8cd1671b45887b22ee35
    C source, ASCII text, with CRLF line terminators
    Panel.h
    28be475577b6420770a821d06c4b54a6
    C source, ASCII text, with CRLF line terminators
    Utils.cpp
    c1eab901415f3aceb90729990a315c56
    C source, ASCII text, with CRLF line terminators
    Utils.h
    b0d157dec8c68ef99cd18a10edfa309b
    C source, ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    meth_get_eip
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/vxunderground/MalwareSourceCode/raw/main/Win32/Win32.HiddenVNCBot.2021.zip
140.82.121.4302 Found0 B
raw.githubusercontent.com/vxunderground/MalwareSourceCode/main/Win32/Win32.HiddenVNCBot.2021.zip
185.199.110.133200 OK409 kB