Report Overview

  1. Submitted URL

    raw.githubusercontent.com/Potential-Threat/Ducky-script-Fake-Windows-Logon/main/FakeLogonScreenToFile.exe

  2. IP

    185.199.111.133

    ASN

    #54113 FASTLY

  3. Submitted

    2023-06-02 07:28:25

    Access

    public

  4. Website Title

  5. Final URL

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    2

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012023-06-02

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
mediumClient IP 192.169.69.26
mediumClient IP 192.169.69.26

Threat Detection Systems

OpenPhish

No alerts detected


PhishTank

No alerts detected


Fortinet's Web Filter

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/Potential-Threat/Ducky-script-Fake-Windows-Logon/main/FakeLogonScreenToFile.exe

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows\012- data

    Size

    28 kB (28160 bytes)

  2. Hash

    93d3e95aa7edb724729e11ab7180327f

    6bc2f3f7fc379795ca5b6250a49ae4e9d2275ee3

    Detections

    AnalyzerVerdictAlert
    VirusTotal52/71

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/Potential-Threat/Ducky-script-Fake-Windows-Logon/main/FakeLogonScreenToFile.exe
185.199.109.133200 OK28 kB