Report Overview
Visitedpublic
2024-11-20 00:31:43
Tags
Submit Tags
URL
github.com/mcdulltii/VENOMRAT-6.0.3/raw/refs/heads/main/LatestRelease.zip
Finishing URL
about:privatebrowsing
IP / ASN
140.82.121.4
#36459 GITHUB
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Host Summary

HostRankRegisteredFirst SeenLast Seen
github.com
14232007-10-092016-07-132024-11-13
raw.githubusercontent.com
358022014-02-062014-03-012024-11-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
raw.githubusercontent.com/mcdulltii/VENOMRAT-6.0.3/refs/heads/main/LatestRelease.zip
IP / ASN
185.199.109.133
#54113 FASTLY
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size5.6 MB (5644228 bytes)
MD51f3d3851380d1158329842419d9124a0
SHA1e3e7b94632322eb70a54dfe0f7be1d91263831ed
Archive (12)
FilenameMD5File type
bdfilters.dlled730387fdcd684b756601b863c47417PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
gup.xmlb023cc4d768b34a5401f317479740a53XML 1.0 document, ASCII text, with CRLF line terminators
libcurl.dll8da7e810e0f12b16fe6087aadda7a69cPE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
LICENSE8e3494bf8cf1967afd3b1016fbbe5bb0ASCII text, with CRLF line terminators
README.md9f56b12cbffcfad543fb1f91e3955f1bASCII text, with CRLF line terminators
libgcc_s_dw2-1.dllc4b4409f186da70fcf2bcc60d5f05489PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
mingwm10.dlldbda60d92e774b4acb3b1cd71f909426PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections
QtCore4.dllbe3317d66646acc0bcb5dda1198db9b5PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections
AtlsWare.exea58fc4577a6ad1b5223b74b902ab2a30PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections
brokeradaptor.dllacb20911248011efec85b6a86a63f76aPE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
irmfmodulewin32.dllc048c29dd017beda7f54607f9e416353PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
qwindows.dll2d08d996a453c97af0a94cf490015f1fPE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections

Detections

AnalyzerVerdictAlert
YARAhub by abuse.chmalware
files - file ~tmp01925d3f.exe
VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
GET github.com/mcdulltii/VENOMRAT-6.0.3/raw/refs/heads/main/LatestRelease.zip
140.82.121.4302 Found0 B
GET raw.githubusercontent.com/mcdulltii/VENOMRAT-6.0.3/refs/heads/main/LatestRelease.zip
185.199.109.133200 OK5.6 MB