Report Overview
Submitted URL
raw.githubusercontent.com/Potential-Threat/Ducky-script-Fake-Windows-Logon/main/FakeLogonScreenToFile.exe
IP
185.199.111.133
ASN
#54113 FASTLY
Submitted
2023-06-02 07:28:25
Access
public
Website Title
Final URL
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
2
Threat Detection Systems
1
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
raw.githubusercontent.com | 35802 | 2014-02-06 | 2014-03-01 | 2023-06-02 | 561 B | 29 kB | 185.199.109.133 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Timestamp | Severity | Source IP | Destination IP | Alert |
---|---|---|---|---|
2023-06-02 07:28:20 | medium | Client IP | 192.169.69.26 | |
2023-06-02 07:28:21 | medium | Client IP | 192.169.69.26 |
Threat Detection Systems
OpenPhish
No alerts detected
PhishTank
No alerts detected
Fortinet's Web Filter
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
raw.githubusercontent.com/Potential-Threat/Ducky-script-Fake-Windows-Logon/main/FakeLogonScreenToFile.exe
IP
185.199.109.133
ASN
#54113 FASTLY
File type
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows\012- data
Size
28 kB (28160 bytes)
Hash
93d3e95aa7edb724729e11ab7180327f
6bc2f3f7fc379795ca5b6250a49ae4e9d2275ee3
Detections
Analyzer | Verdict | Alert |
---|---|---|
VirusTotal | 52/71 |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
raw.githubusercontent.com/Potential-Threat/Ducky-script-Fake-Windows-Logon/main/FakeLogonScreenToFile.exe | 185.199.109.133 | 200 OK | 28 kB | |||||||
Detections
HTTP Headers
| ||||||||||