Report Overview

  1. Visited public
    2024-12-11 20:58:53
    Tags
  2. URL

    github.com/codeinephosphate/wsappxfork/raw/refs/heads/main/wsappxx.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.3

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-12-11
raw.githubusercontent.com358022014-02-062014-03-012024-12-11

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/codeinephosphate/wsappxfork/refs/heads/main/wsappxx.exeDetects an SFX archive with automatic script execution
mediumraw.githubusercontent.com/codeinephosphate/wsappxfork/refs/heads/main/wsappxx.exefiles - file ~tmp01925d3f.exe

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/codeinephosphate/wsappxfork/refs/heads/main/wsappxx.exe

  2. IP

    185.199.108.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32+ executable (GUI) x86-64, for MS Windows, 8 sections

    Size

    814 kB (813709 bytes)

  2. Hash

    5760979181d9b0931e92205cf4afe5f5

    e005da60051b10d046c6bc9d703c2a2fb1b8a1d8

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detects an SFX archive with automatic script execution
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/codeinephosphate/wsappxfork/raw/refs/heads/main/wsappxx.exe
140.82.121.4302 Found0 B
raw.githubusercontent.com/codeinephosphate/wsappxfork/refs/heads/main/wsappxx.exe
185.199.108.133200 OK814 kB