Report Overview
Visitedpublic
2024-11-21 23:05:45
Tags
Submit Tags
URL
gcdn.thunderstore.io/live/repository/packages/SkinwalkerModTeam-SkinWalkerMods-1.0.0.zip
Finishing URL
about:privatebrowsing
IP / ASN
185.244.209.62
#199524 G-Core Labs S.A.
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
gcdn.thunderstore.io
5953952019-04-052021-08-082024-11-21

Related reports

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
gcdn.thunderstore.io/live/repository/packages/SkinwalkerModTeam-SkinWalkerMods-1.0.0.zip
IP / ASN
185.244.209.62
#199524 G-Core Labs S.A.
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size438 kB (438047 bytes)
MD519db62c04b1f30a019ac3a6eae94d3b2
SHA1b087bdc48172bb46f8e18183cd04296f1ebc06cf
Archive (4)
FilenameMD5File type
SkinWalker.dllee9cd8657560c102441d15ac13053c67PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
icon.pngfd0f5271a1c1b16218a2632b32d60766PNG image data, 256 x 256, 8-bit/color RGB, non-interlaced
manifest.json037524162ae83ce6f08d1598022e053bJSON text data
README.mdd41d8cd98f00b204e9800998ecf8427e

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize