Report Overview
Visitedpublic
2024-08-01 15:08:06
Tags
Submit Tags
URL
raw.githubusercontent.com/stephenfewer/reflectivedllinjection/master/bin/reflective_dll.dll
Finishing URL
about:privatebrowsing
IP / ASN

185.199.110.133
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
r10.o.lencr.org | unknown | 2020-06-29 | 2024-06-06 21:45:11 | 2024-07-31 18:12:05 | 2.0 kB | 5.3 kB | ![]() 23.33.119.57 | |
raw.githubusercontent.com 5 alert(s) on this Domain | 35802 | 2014-02-06 | 2014-03-01 08:08:08 | 2024-07-31 19:04:38 | 545 B | 60 kB | ![]() 185.199.109.133 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
No alerts detected
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2024-08-01 | medium | raw.githubusercontent.com/stephenfewer/reflectivedllinjection/master/bin/reflective_dll.dll | Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip |
2024-08-01 | medium | raw.githubusercontent.com/stephenfewer/reflectivedllinjection/master/bin/reflective_dll.dll | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended |
2024-08-01 | medium | raw.githubusercontent.com/stephenfewer/reflectivedllinjection/master/bin/reflective_dll.dll | Detects Reflective DLL Loader |
2024-08-01 | medium | raw.githubusercontent.com/stephenfewer/reflectivedllinjection/master/bin/reflective_dll.dll | Detects Reflective DLL Loader - suspicious - Possible FP could be program crack |
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
File detected
URL
raw.githubusercontent.com/stephenfewer/reflectivedllinjection/master/bin/reflective_dll.dll
IP / ASN

185.199.109.133
File Overview
File TypePE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
Size59 kB (58880 bytes)
MD5c2fea540aac9f04045b302916cd1c5cb
SHA1e0866f1c6497b69dda6f93de4e5245bc53e0f129
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip |
Public Nextron YARA rules | malware | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended |
Public Nextron YARA rules | malware | Detects Reflective DLL Loader |
Public Nextron YARA rules | malware | Detects Reflective DLL Loader - suspicious - Possible FP could be program crack |
VirusTotal | malicious |
JavaScript (0)
No JavaScripts
HTTP Transactions (7)
URL | IP | Response | Size |
---|