Report Overview

  1. Visited public
    2024-11-20 00:31:43
    Tags
  2. URL

    github.com/mcdulltii/VENOMRAT-6.0.3/raw/refs/heads/main/LatestRelease.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-11-13
raw.githubusercontent.com358022014-02-062014-03-012024-11-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/mcdulltii/VENOMRAT-6.0.3/refs/heads/main/LatestRelease.zip

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    5.6 MB (5644228 bytes)

  2. Hash

    1f3d3851380d1158329842419d9124a0

    e3e7b94632322eb70a54dfe0f7be1d91263831ed

  1. Archive (12)

  2. FilenameMd5File type
    bdfilters.dll
    ed730387fdcd684b756601b863c47417
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    gup.xml
    b023cc4d768b34a5401f317479740a53
    XML 1.0 document, ASCII text, with CRLF line terminators
    libcurl.dll
    8da7e810e0f12b16fe6087aadda7a69c
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
    LICENSE
    8e3494bf8cf1967afd3b1016fbbe5bb0
    ASCII text, with CRLF line terminators
    README.md
    9f56b12cbffcfad543fb1f91e3955f1b
    ASCII text, with CRLF line terminators
    libgcc_s_dw2-1.dll
    c4b4409f186da70fcf2bcc60d5f05489
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
    mingwm10.dll
    dbda60d92e774b4acb3b1cd71f909426
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections
    QtCore4.dll
    be3317d66646acc0bcb5dda1198db9b5
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections
    AtlsWare.exe
    a58fc4577a6ad1b5223b74b902ab2a30
    PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections
    brokeradaptor.dll
    acb20911248011efec85b6a86a63f76a
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
    irmfmodulewin32.dll
    c048c29dd017beda7f54607f9e416353
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    qwindows.dll
    2d08d996a453c97af0a94cf490015f1f
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/mcdulltii/VENOMRAT-6.0.3/raw/refs/heads/main/LatestRelease.zip
140.82.121.4302 Found0 B
raw.githubusercontent.com/mcdulltii/VENOMRAT-6.0.3/refs/heads/main/LatestRelease.zip
185.199.109.133200 OK5.6 MB