Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
github.com | 1423 | 2007-10-09 | 2016-07-13 | 2025-03-26 | 557 B | 2.9 MB | ![]() |
objects.githubusercontent.com | 134060 | 2014-02-06 | 2021-11-01 | 2025-03-26 | 967 B | 2.9 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
objects.githubusercontent.com/github-production-release-asset-2e65be/951118077/6f53c49d-bdee-4efe-8b9b-2fc29f4a252e?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250326%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250326T174257Z&X-Amz-Expires=300&X-Amz-Signature=2a9c483ae93f05018d6619625a34a6c9df375c7d87a135d5ecfd6ab9e26a1ee7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DBANGER.zip&response-content-type=application%2Foctet-stream
IP
185.199.111.133
ASN
#54113 FASTLY
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
2.9 MB (2887902 bytes)
Hash
468ed15732330751ff2f626970dfccfd
df50d86f08e430cadeb9ae136be2fd0e1a4193b9
Archive (19)
Filename | Md5 | File type | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
rtkiow10x64.sys | 96a8b535b5e14b582ca5679a3e2a5946
| PE32+ executable (native) x86-64, for MS Windows, 8 sections | ||||||||||||
ss2031.exe | 206fbc02bfe3a68ee7c9f26555a94d89 | PE32+ executable (console) x86-64, for MS Windows, 5 sections | ||||||||||||
SxeaaV1X64.sys | 785045f8b25cd2e937ddc6b09debe01a
| PE32+ executable (native) x86-64, for MS Windows, 5 sections | ||||||||||||
Volumeid64.exe | 81a45f1a91448313b76d2e6d5308aa7a | PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||||||||
AeeccSV1X64.sys | 9accebd928a8926fecf317f53cd1c44e
| PE32+ executable (native) x86-64, for MS Windows, 8 sections | ||||||||||||
AfkzzV1X64.sys | 785045f8b25cd2e937ddc6b09debe01a
| PE32+ executable (native) x86-64, for MS Windows, 5 sections | ||||||||||||
db3289.exe | 24eba1406ae001c6474e4cab574987f4
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||||||||
db3289.exe.bak | 24eba1406ae001c6474e4cab574987f4
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||||||||
eu4837.exe | 4325420a99393a6ad6044818ae61f945 | PE32+ executable (console) x86-64, for MS Windows, 7 sections | ||||||||||||
fb4953.exe | 03920d49be940f5a272b264fb1c37c04
| PE32+ executable (console) x86-64, for MS Windows, 5 sections | ||||||||||||
i3782.bat | 3847c26e5010cef400a328889a37dc7b | DOS batch file, ASCII text, with CRLF line terminators | ||||||||||||
iqvsw64e.cat | 93e365f71c2e9c8d61c64f2783fa0868 | DER Encoded PKCS#7 Signed Data | ||||||||||||
iqvsw64e.inf | 9fc2029a6ebf64e1af9f656b82fdea1a | Windows setup INFormation | ||||||||||||
iqvsw64e.sys | a04fa610c631055c3c7b11df5887fbab
| PE32+ executable (native) x86-64, for MS Windows, 8 sections | ||||||||||||
Kernel Spoofer.exe | df2c3be4ee2981c9803a60044e4b8cda
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||||||||
Kokuban.dll | 4e04df2191f5d7c13f86631e206a16eb | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||||||||
rn3987.exe | 302a86510b5c2a807bfad326224880d1
| PE32+ executable (console) x86-64, for MS Windows, 7 sections | ||||||||||||
RTIoLib64.dll | 23b63b64c57ffe0129af6ee4b38ea7db | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections | ||||||||||||
rtkio64.sys | 96e10a2904fff9491762a4fb549ad580
| PE32+ executable (native) x86-64, for MS Windows, 8 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - rtkio64.sys |
YARAhub by abuse.ch | malware | signed_sys_with_vulnerablity |
Elastic Security YARA Rules | malware | Windows.VulnDriver.Rtkio |
YARAhub by abuse.ch | malware | signed_sys_with_vulnerablity |
Elastic Security YARA Rules | malware | Windows.VulnDriver.Amifldrv |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | signed_sys_with_vulnerablity |
YARAhub by abuse.ch | malware | signed_sys_with_vulnerablity |
Elastic Security YARA Rules | malware | Windows.VulnDriver.Amifldrv |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | signed_sys_with_vulnerablity |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | signed_sys_with_vulnerablity |
Elastic Security YARA Rules | malware | Windows.VulnDriver.Rtkio |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
github.com/svysjghvkshdhhk/qs-bsv-csdv-sdncsdnh/releases/download/hgsdhfgfkshf/BANGER.zip | ![]() | 302 Found | 2.9 MB | |||||||
HTTP Headers
| ||||||||||
objects.githubusercontent.com/github-production-release-asset-2e65be/951118077/6f53c49d-bdee-4efe-8b9b-2fc29f4a252e?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250326%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250326T174257Z&X-Amz-Expires=300&X-Amz-Signature=2a9c483ae93f05018d6619625a34a6c9df375c7d87a135d5ecfd6ab9e26a1ee7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DBANGER.zip&response-content-type=application%2Foctet-stream | ![]() | 200 OK | 2.9 MB | |||||||
Detections
HTTP Headers
| ||||||||||