Report Overview
Visitedpublic
2024-07-22 13:39:47
Tags
Submit Tags
URL
github.com/anonyketa/EXM-Tweaking-Utility-Premium/releases/download/V1.0/exm.zip
Finishing URL
about:privatebrowsing
IP / ASN
140.82.121.4
#36459 GITHUB
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
17

Host Summary

HostRankRegisteredFirst SeenLast Seen
r10.o.lencr.org
unknown2020-06-292024-06-06 21:45:112024-07-21 18:21:45
github.com
14232007-10-092016-07-13 12:28:222024-07-20 18:33:01
objects.githubusercontent.com
1340602014-02-062021-11-01 22:34:292024-07-22 08:00:33

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
objects.githubusercontent.com/github-production-release-asset-2e65be/788602973/155079ac-89e1-4e98-a922-c703b9e943ad?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240722%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240722T133916Z&X-Amz-Expires=300&X-Amz-Signature=c3497768929eb14a13ee2ed6ee756d348b91f1523785d59c24ac888958a6c4b6&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=788602973&response-content-disposition=attachment%3B%20filename%3Dexm.zip&response-content-type=application%2Foctet-stream
IP / ASN
185.199.109.133
#54113 FASTLY
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=store
Size18 MB (18436602 bytes)
MD5398dd2d428bb6073e7e370783a827855
SHA1392a4ac9f34a8e5b0d5b360b20aa7ffac1fee68a
Archive (19)
FilenameMD5File type
autoruns.chm2c099793584365b8897fca7a4fa397e8MS Windows HtmlHelp Data
Autoruns.exe583ed542be17b83f3c102d49fe984e26PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
Autoruns.zip13979eb536387f8bc170608ea80f79c7Zip archive data, at least v2.0 to extract, compression method=deflate
Autoruns64.exe2b2d8df5fc1cab874d05c4a820fbcde3PE32+ executable (GUI) x86-64, for MS Windows, 9 sections
Autoruns64a.exed78b5fe87f5569f60277713da73c01eaPE32+ executable (GUI) Aarch64, for MS Windows, 8 sections
autorunsc.exe86abd51a63aa80dd57f491d9bc489930PE32 executable (console) Intel 80386, for MS Windows, 5 sections
autorunsc64.exe75c71f8328f5ed7e9f638a40aecacfd6PE32+ executable (console) x86-64, for MS Windows, 7 sections
autorunsc64a.exeec8f9be5c1065f14b897bbb78c01ea41PE32+ executable (console) Aarch64, for MS Windows, 6 sections
Eula.txt8c24c4084cdc3b7e7f7a88444a012bfcUnicode text, UTF-8 (with BOM) text, with very long lines (518), with CRLF line terminators
EXMservice.exe7b2774daa729996f901ab01b47696ea0PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
Fortnite_Settings.exea39de0d010e9d34de70abad81f031e23PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
Exm_Premium_Profile_V4.nipd5563eaeb8f6e5dbfb2d01fd24b7c8d5XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
nv.configce6d0bc7328b0fab08de80f292c1eaa4XML 1.0 document, ASCII text
nvidiaProfileInspector.exeff5f39370b67a274cb58ba7e2039d2e2PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
Reference.xml1a8493bff2d17c83e299101954dcb562XML 1.0 document, ASCII text, with CRLF line terminators
Exm_Premium_Power_Plan_V3.powabec2ceb9e8425172e1c7bbabbaf8eb1MS Windows registry file, NT/2000 or above
Wub.exe82aff8883099cf75462057c4e47e88acPE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
Wub.inia16bf55cd2ef7d9e56565b0ed1aa208aUnicode text, UTF-16, little-endian text, with CRLF line terminators
Wub_x64.exe9d6778f7f274f7ecd4e7e875a7268b64PE32+ executable (GUI) x86-64, for MS Windows, 5 sections

Detections

AnalyzerVerdictAlert
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
files - file ~tmp01925d3f.exe
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
files - file ~tmp01925d3f.exe
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
files - file ~tmp01925d3f.exe
Public Nextron YARA rulesmalware
Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
Public InfoSec YARA rulesmalware
Identifies executable converted using PyInstaller.
YARAhub by abuse.chmalware
meth_get_eip
Public InfoSec YARA rulesmalware
Identifies compiled AutoIT script (as EXE).
Public InfoSec YARA rulesmalware
Identifies compiled AutoIT script (as EXE).
VirusTotalmalicious

JavaScript (0)

HTTP Transactions (8)

URLIPResponseSize
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
GET github.com/anonyketa/EXM-Tweaking-Utility-Premium/releases/download/V1.0/exm.zip
140.82.121.4302 Found0 B
r10.o.lencr.org/
23.36.77.32 504 B
GET objects.githubusercontent.com/github-production-release-asset-2e65be/788602973/155079ac-89e1-4e98-a922-c703b9e943ad?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240722%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240722T133916Z&X-Amz-Expires=300&X-Amz-Signature=c3497768929eb14a13ee2ed6ee756d348b91f1523785d59c24ac888958a6c4b6&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=788602973&response-content-disposition=attachment%3B%20filename%3Dexm.zip&response-content-type=application%2Foctet-stream
185.199.109.133200 OK18 MB
r10.o.lencr.org/
23.36.76.226 504 B
r10.o.lencr.org/
23.36.76.226 504 B