Report Overview

  1. Submitted URL

    github.com/brunolee-GIT/W3M0dP4tch32/releases/download/Portable/Portable.zip

  2. IP

    140.82.121.4

    ASN

    #36459 GITHUB

  3. Submitted

    2024-03-28 15:13:59

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    8

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
objects.githubusercontent.com1340602014-02-062021-11-012024-03-28

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    objects.githubusercontent.com/github-production-release-asset-2e65be/683566786/36e67fef-3e93-4c5c-b605-d6703ff7ddad?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20240328%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240328T151330Z&X-Amz-Expires=300&X-Amz-Signature=389b7f382b9beff24b304fd73377031306083f1def6e5ef61159365ad6d21e9e&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=683566786&response-content-disposition=attachment%3B%20filename%3Dportable.zip&response-content-type=application%2Foctet-stream

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    4.6 MB (4602133 bytes)

  2. Hash

    d76c1aabffa97fc210e1613cebc4c828

    b91e03a5e805099e89b9e3910b7de6ed54569c41

  1. Archive (22)

  2. FilenameMd5File type
    init.json
    bdd1c6c14e71aff1070a0ee53496fbc6
    JSON text data
    000003.log
    2ac8bb9e347a6dcb69cfc1af7f89858f
    data
    000004.log
    62bd7c1e6cd3ea204dd4d0810bf43ea9
    data
    000005.ldb
    48db7901ba03c1837917f7413881a8a5
    data
    CURRENT
    46295cac801e5d4857d09837238a6394
    ASCII text
    LOCK
    d41d8cd98f00b204e9800998ecf8427e
    LOG
    db8bee1161f2b4e0b6474e87b0d5dbfb
    ASCII text
    MANIFEST-000001
    5af87dfd673ba2115e2fcf5cfdb727ab
    OpenPGP Secret Key
    7z.dll
    bbf51226a8670475f283a2d57460d46c
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    7z.exe
    fe522d8659618e3a50aafd8ac1518638
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    Asar.64.dll
    d58b5f3fd9f22b4995b3dc532a8cef21
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 9 sections
    PRO_GIFT
    6294d2087f03aa9bd0535ac05b703011
    ASCII text, with CRLF line terminators
    WPDUP.bat
    b1d65034c124e460557888a2707e7627
    DOS batch file, ASCII text, with CRLF line terminators, with escape sequences
    WeMod Portable.exe
    b822ab0ddc77a25513dad600b0b77d76
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    WeMod Portable.ini
    75c11c509e01003abb9b20a1b496cb33
    ASCII text
    WeMod Local.ini
    0cae36fb0a884bd9d63029ea709a0f3c
    ASCII text, with CRLF line terminators
    WeMod Portable.ini
    b37c0c78a9004b1afb989c1f61d2ae0f
    ASCII text, with CRLF line terminators
    WeMod Updater.ini
    b7a31a18d7470f0397bac556bbd5b1d8
    ASCII text, with CRLF line terminators
    Readme.txt
    6d249bb79f97a0f042cbe1ff73b8fa56
    ASCII text, with CRLF line terminators
    WeMod Local.exe
    46254aab89ed987c5cdeabd9fb723a45
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    WeMod Portable.exe
    a80f5aa9273488c4d5c621645cdaba79
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    WeMod Updater.exe
    bbf14bff51583eaa4d7e28256269239c
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious file path pointing to the root of a folder easily accessible via environment variables
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/brunolee-GIT/W3M0dP4tch32/releases/download/Portable/Portable.zip
140.82.121.4302 Found0 B
objects.githubusercontent.com/github-production-release-asset-2e65be/683566786/36e67fef-3e93-4c5c-b605-d6703ff7ddad?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20240328%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240328T151330Z&X-Amz-Expires=300&X-Amz-Signature=389b7f382b9beff24b304fd73377031306083f1def6e5ef61159365ad6d21e9e&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=683566786&response-content-disposition=attachment%3B%20filename%3Dportable.zip&response-content-type=application%2Foctet-stream
185.199.109.133200 OK4.6 MB