Report Overview

  1. Visited public
    2024-06-21 01:31:42
    Tags
  2. URL

    github.com/corpnewt/USBMap/archive/master.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.3

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
r10.o.lencr.orgunknown2020-06-292024-06-06 21:45:112024-06-20 18:12:07
github.com14232007-10-092016-07-13 12:28:222024-06-20 19:23:27
codeload.github.com623592007-10-092013-04-18 13:49:112024-06-13 15:11:51

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/corpnewt/USBMap/zip/refs/heads/master

  2. IP

    140.82.121.10

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    618 kB (618244 bytes)

  2. Hash

    e488d44761f2f477c6cb3b63a9a771d6

    2757584ce5ac1c54be84eb3dd3f17fb98886a5ab

  1. Archive (19)

  2. FilenameMd5File type
    .gitattributes
    aba76f6f4814c73c1effe0d037ac8302
    ASCII text
    .gitignore
    8c53b7fd8530d248e8f35f7b603cfd6f
    ASCII text
    Information.md
    0e5d567d8e902e4a0aae34e274f8fe27
    Unicode text, UTF-8 text, with very long lines (1017)
    LICENSE
    d4eae1fe11ccc421907c2ef5f31aa1d6
    ASCII text
    README.md
    db1d3c1ee5a58a077fe718873a3ce56d
    Unicode text, UTF-8 text, with very long lines (537)
    __init__.py
    a2776c3b8a985f2b01bbd22e8ed5bc9c
    Python script, ASCII text executable
    ioreg.py
    0d996502080ceffec3646dfeb834ca04
    Python script, ASCII text executable, with CRLF line terminators
    plist.py
    1fc08f8765d06341c59f666237bb2a38
    Python script, ASCII text executable
    reveal.py
    5f80514e59a4fdfb26a8cd664b9613dc
    Python script, ASCII text executable
    run.py
    b96f5da65594328d810696f0bd5cc132
    Python script, ASCII text executable, with CRLF line terminators
    utils.py
    602bb4b03fea260f79f36ff0a186ec6f
    Python script, ASCII text executable
    USBMap.command
    97d9f4ce34c2c9a3aee32df6dc52b30f
    Bourne-Again shell script, ASCII text executable
    USBMap.py
    3848d77baa0397030cd9f6ae775a6ea8
    Python script, ASCII text executable
    USBMapInjectorEdit.bat
    f01ab6e699858aad7127bd1125c55b50
    DOS batch file, ASCII text, with very long lines (679), with CRLF line terminators
    USBMapInjectorEdit.command
    97d9f4ce34c2c9a3aee32df6dc52b30f
    Bourne-Again shell script, ASCII text executable
    USBMapInjectorEdit.py
    2ce90811a2054c331b268c8ed7aaaf23
    Python script, ASCII text executable
    USB3.png
    5f4302d720865bf1bb2806f37a0f42be
    PNG image data, 600 x 450, 8-bit/color RGBA, non-interlaced
    imac171.png
    0aecb3a341a43a539bbdd2dcd6b1c05e
    PNG image data, 1003 x 620, 8-bit/color RGBA, non-interlaced
    look-sir-ports.png
    04ae0c1637d88465363d4902f2a61f48
    PNG image data, 512 x 270, 8-bit/color RGB, non-interlaced

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious PowerShell code that downloads from web sites

JavaScript (0)

HTTP Transactions (7)

URLIPResponseSize
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
github.com/corpnewt/USBMap/archive/master.zip
140.82.121.3302 Found0 B
r10.o.lencr.org/
23.36.76.226 504 B
r10.o.lencr.org/
23.36.76.226 504 B
codeload.github.com/corpnewt/USBMap/zip/refs/heads/master
140.82.121.10200 OK618 kB