Report Overview

  1. Visited public
    2024-10-09 09:58:25
    Tags
  2. URL

    github.com/Flowseal/zapret-discord-youtube/archive/refs/heads/main.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
codeload.github.com623592007-10-092013-04-18 13:49:112024-10-08 13:51:08
r11.o.lencr.orgunknown2020-06-292024-06-07 07:43:572024-10-07 19:37:45
r10.o.lencr.orgunknown2020-06-292024-06-06 21:45:112024-10-07 19:37:44
github.com14232007-10-092016-07-13 12:28:222024-09-30 08:19:04

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/Flowseal/zapret-discord-youtube/zip/refs/heads/main

  2. IP

    140.82.121.10

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    1.2 MB (1190660 bytes)

  2. Hash

    3408b063de31f5b30e088eebf9682881

    bcae0fc15a8d56687f23488cc09a4a90b1124ff6

  1. Archive (14)

  2. FilenameMd5File type
    README.md
    b6a1119432f4a5ff1510cd140583347a
    Unicode text, UTF-8 text
    WinDivert.dll
    b2014d33ee645112d5dc16fe9d9fcbff
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections
    WinDivert64.sys
    89ed5be7ea83c01d0de33d3519944aa5
    PE32+ executable (native) x86-64, for MS Windows, 8 sections
    cygwin1.dll
    c50b50303fae4afe7248307339a00d13
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 3 sections
    discord.bat
    92bd2198b52fa1f69424fb254ef69e2a
    ASCII text, with CRLF line terminators
    discord_youtube.bat
    d142d810c39ba859f5904d4cc3386eb2
    ASCII text, with CRLF line terminators
    list-discord.txt
    6b11a60838a26a7b78f366036ac5e945
    ASCII text, with CRLF line terminators
    list-general.txt
    973ce9fd99ce984a7c4ed77d41acaf3b
    ASCII text, with CRLF line terminators
    quic_initial_www_google_com.bin
    312526d39958d89b1f8ab67789ab985f
    data
    service_discord.bat
    22b7b6c45e0daee0b4c57976b7b97715
    ASCII text, with CRLF line terminators
    service_discord_youtube.bat
    03eb7e8bb876160ad50c8cb667f6947d
    ASCII text, with CRLF line terminators
    service_remove.bat
    2b13379ee5f8beb73328aaad75595a37
    ASCII text
    tls_clienthello_www_google_com.bin
    7ab7ad857c5b8794fbdf1091b494dc94
    data
    winws.exe
    8c624e64742bc19447d52f61edec52db
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 10 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects WinDivert User-Mode packet capturing driver
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (10)

URLIPResponseSize
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
github.com/Flowseal/zapret-discord-youtube/archive/refs/heads/main.zip
140.82.121.4302 Found0 B
codeload.github.com/Flowseal/zapret-discord-youtube/zip/refs/heads/main
140.82.121.10200 OK1.2 MB
r11.o.lencr.org/
23.33.119.27 504 B
r11.o.lencr.org/
23.33.119.27 504 B
r11.o.lencr.org/
23.33.119.27 504 B
r11.o.lencr.org/
23.33.119.27 504 B