Report Overview
Submitted URL
huggingface.co/icecream0910/taein-tts/resolve/c288dff146c3673068d7efe168c1a378288ce015/server/server.exe?download=true
IP
143.204.55.121
ASN
#16509 AMAZON-02
Submitted
2024-05-05 01:13:38
Access
public
Website Title
about:privatebrowsing
Final URL
about:privatebrowsing
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
huggingface.co | 111951 | 2016-07-18 | 2016-09-18 | 2024-05-02 | 572 B | 4.6 kB | 143.204.55.121 |
cdn-lfs-us-1.huggingface.co | unknown | 2016-07-18 | 2023-10-24 | 2024-05-02 | 1.6 kB | 787 kB | 54.230.111.13 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2024-05-05 | medium | cdn-lfs-us-1.huggingface.co/repos/fa/f9/faf934c2e3dfdda35e2e8599b26f6f18c2b7c4ca7b2f61a304036a652b214b3f/acbd272e12b7d1518ac133731fbde3a95d4215af1a45fb1a53581cd60c91432e?response-content-disposition=attachment%3B+filename*%3DUTF-8%27%27server.exe%3B+filename%3D%22server.exe%22%3B&response-content-type=application%2Fx-msdos-program&Expires=1715130792&Policy=eyJTdGF0ZW1lbnQiOlt7IkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTcxNTEzMDc5Mn19LCJSZXNvdXJjZSI6Imh0dHBzOi8vY2RuLWxmcy11cy0xLmh1Z2dpbmdmYWNlLmNvL3JlcG9zL2ZhL2Y5L2ZhZjkzNGMyZTNkZmRkYTM1ZTJlODU5OWIyNmY2ZjE4YzJiN2M0Y2E3YjJmNjFhMzA0MDM2YTY1MmIyMTRiM2YvYWNiZDI3MmUxMmI3ZDE1MThhYzEzMzczMWZiZGUzYTk1ZDQyMTVhZjFhNDVmYjFhNTM1ODFjZDYwYzkxNDMyZT9yZXNwb25zZS1jb250ZW50LWRpc3Bvc2l0aW9uPSomcmVzcG9uc2UtY29udGVudC10eXBlPSoifV19&Signature=eZ5a9XzvZXKiX7eB%7E3P57yS1jTK3RMRfO%7Et%7Evm0YprLvbUR3qVJpnBqBtoMKd5NibTyTpPENGP0oclVOKu%7E11U-m3pakPJyyb%7ET0RtQ%7Erwq7Ea9YiqlJ6RejuF3FVD-qnlC1yiSRIX3nU6n9V7qmJiCy1FjpyWQ1wRg2vojQs%7EMcBzsLttx-NldRHXOdWSFU2W0QwYWpomH2LZHMfRt1I%7EIwhjqvhH9QXVywx13nMVMKjubika-DvGfASIkaDU4YmxFzaIRdP3K%7EMIfgNZLLX3-xtx0SiKTwodoOz8AoLQLZEajI0cHxX5aEyCE1icn562E90Mr7JMuDeXx0Va1krw__&Key-Pair-Id=KCD77M1F0VK2B | files - file ~tmp01925d3f.exe |
2024-05-05 | medium | cdn-lfs-us-1.huggingface.co/repos/fa/f9/faf934c2e3dfdda35e2e8599b26f6f18c2b7c4ca7b2f61a304036a652b214b3f/acbd272e12b7d1518ac133731fbde3a95d4215af1a45fb1a53581cd60c91432e?response-content-disposition=attachment%3B+filename*%3DUTF-8%27%27server.exe%3B+filename%3D%22server.exe%22%3B&response-content-type=application%2Fx-msdos-program&Expires=1715130792&Policy=eyJTdGF0ZW1lbnQiOlt7IkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTcxNTEzMDc5Mn19LCJSZXNvdXJjZSI6Imh0dHBzOi8vY2RuLWxmcy11cy0xLmh1Z2dpbmdmYWNlLmNvL3JlcG9zL2ZhL2Y5L2ZhZjkzNGMyZTNkZmRkYTM1ZTJlODU5OWIyNmY2ZjE4YzJiN2M0Y2E3YjJmNjFhMzA0MDM2YTY1MmIyMTRiM2YvYWNiZDI3MmUxMmI3ZDE1MThhYzEzMzczMWZiZGUzYTk1ZDQyMTVhZjFhNDVmYjFhNTM1ODFjZDYwYzkxNDMyZT9yZXNwb25zZS1jb250ZW50LWRpc3Bvc2l0aW9uPSomcmVzcG9uc2UtY29udGVudC10eXBlPSoifV19&Signature=eZ5a9XzvZXKiX7eB%7E3P57yS1jTK3RMRfO%7Et%7Evm0YprLvbUR3qVJpnBqBtoMKd5NibTyTpPENGP0oclVOKu%7E11U-m3pakPJyyb%7ET0RtQ%7Erwq7Ea9YiqlJ6RejuF3FVD-qnlC1yiSRIX3nU6n9V7qmJiCy1FjpyWQ1wRg2vojQs%7EMcBzsLttx-NldRHXOdWSFU2W0QwYWpomH2LZHMfRt1I%7EIwhjqvhH9QXVywx13nMVMKjubika-DvGfASIkaDU4YmxFzaIRdP3K%7EMIfgNZLLX3-xtx0SiKTwodoOz8AoLQLZEajI0cHxX5aEyCE1icn562E90Mr7JMuDeXx0Va1krw__&Key-Pair-Id=KCD77M1F0VK2B | Identifies executable converted using PyInstaller. |
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
cdn-lfs-us-1.huggingface.co/repos/fa/f9/faf934c2e3dfdda35e2e8599b26f6f18c2b7c4ca7b2f61a304036a652b214b3f/acbd272e12b7d1518ac133731fbde3a95d4215af1a45fb1a53581cd60c91432e?response-content-disposition=attachment%3B+filename*%3DUTF-8%27%27server.exe%3B+filename%3D%22server.exe%22%3B&response-content-type=application%2Fx-msdos-program&Expires=1715130792&Policy=eyJTdGF0ZW1lbnQiOlt7IkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTcxNTEzMDc5Mn19LCJSZXNvdXJjZSI6Imh0dHBzOi8vY2RuLWxmcy11cy0xLmh1Z2dpbmdmYWNlLmNvL3JlcG9zL2ZhL2Y5L2ZhZjkzNGMyZTNkZmRkYTM1ZTJlODU5OWIyNmY2ZjE4YzJiN2M0Y2E3YjJmNjFhMzA0MDM2YTY1MmIyMTRiM2YvYWNiZDI3MmUxMmI3ZDE1MThhYzEzMzczMWZiZGUzYTk1ZDQyMTVhZjFhNDVmYjFhNTM1ODFjZDYwYzkxNDMyZT9yZXNwb25zZS1jb250ZW50LWRpc3Bvc2l0aW9uPSomcmVzcG9uc2UtY29udGVudC10eXBlPSoifV19&Signature=eZ5a9XzvZXKiX7eB%7E3P57yS1jTK3RMRfO%7Et%7Evm0YprLvbUR3qVJpnBqBtoMKd5NibTyTpPENGP0oclVOKu%7E11U-m3pakPJyyb%7ET0RtQ%7Erwq7Ea9YiqlJ6RejuF3FVD-qnlC1yiSRIX3nU6n9V7qmJiCy1FjpyWQ1wRg2vojQs%7EMcBzsLttx-NldRHXOdWSFU2W0QwYWpomH2LZHMfRt1I%7EIwhjqvhH9QXVywx13nMVMKjubika-DvGfASIkaDU4YmxFzaIRdP3K%7EMIfgNZLLX3-xtx0SiKTwodoOz8AoLQLZEajI0cHxX5aEyCE1icn562E90Mr7JMuDeXx0Va1krw__&Key-Pair-Id=KCD77M1F0VK2B
IP
54.230.111.13
ASN
#16509 AMAZON-02
File type
PE32+ executable (console) x86-64, for MS Windows, 7 sections
Size
786 kB (786432 bytes)
Hash
c80ceaa07a1f34657006d8c1a1de474b
f3c88c3be300e41a8a9ea7198cf62198b4352de2
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
Public InfoSec YARA rules | malware | Identifies executable converted using PyInstaller. |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
huggingface.co/icecream0910/taein-tts/resolve/c288dff146c3673068d7efe168c1a378288ce015/server/server.exe?download=true | 143.204.55.121 | 302 Found | 2.5 kB | ||||||||||
HTTP Headers
| |||||||||||||
cdn-lfs-us-1.huggingface.co/repos/fa/f9/faf934c2e3dfdda35e2e8599b26f6f18c2b7c4ca7b2f61a304036a652b214b3f/acbd272e12b7d1518ac133731fbde3a95d4215af1a45fb1a53581cd60c91432e?response-content-disposition=attachment%3B+filename*%3DUTF-8%27%27server.exe%3B+filename%3D%22server.exe%22%3B&response-content-type=application%2Fx-msdos-program&Expires=1715130792&Policy=eyJTdGF0ZW1lbnQiOlt7IkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTcxNTEzMDc5Mn19LCJSZXNvdXJjZSI6Imh0dHBzOi8vY2RuLWxmcy11cy0xLmh1Z2dpbmdmYWNlLmNvL3JlcG9zL2ZhL2Y5L2ZhZjkzNGMyZTNkZmRkYTM1ZTJlODU5OWIyNmY2ZjE4YzJiN2M0Y2E3YjJmNjFhMzA0MDM2YTY1MmIyMTRiM2YvYWNiZDI3MmUxMmI3ZDE1MThhYzEzMzczMWZiZGUzYTk1ZDQyMTVhZjFhNDVmYjFhNTM1ODFjZDYwYzkxNDMyZT9yZXNwb25zZS1jb250ZW50LWRpc3Bvc2l0aW9uPSomcmVzcG9uc2UtY29udGVudC10eXBlPSoifV19&Signature=eZ5a9XzvZXKiX7eB%7E3P57yS1jTK3RMRfO%7Et%7Evm0YprLvbUR3qVJpnBqBtoMKd5NibTyTpPENGP0oclVOKu%7E11U-m3pakPJyyb%7ET0RtQ%7Erwq7Ea9YiqlJ6RejuF3FVD-qnlC1yiSRIX3nU6n9V7qmJiCy1FjpyWQ1wRg2vojQs%7EMcBzsLttx-NldRHXOdWSFU2W0QwYWpomH2LZHMfRt1I%7EIwhjqvhH9QXVywx13nMVMKjubika-DvGfASIkaDU4YmxFzaIRdP3K%7EMIfgNZLLX3-xtx0SiKTwodoOz8AoLQLZEajI0cHxX5aEyCE1icn562E90Mr7JMuDeXx0Va1krw__&Key-Pair-Id=KCD77M1F0VK2B | 54.230.111.13 | 200 OK | 786 kB | ||||||||||
Detections
HTTP Headers
| |||||||||||||