Report Overview
Visitedpublic
2024-11-29 18:41:03
Tags
Submit Tags
URL
raw.githubusercontent.com/MangoManRbX/Moonware-/refs/heads/main/MoonWareGit.zip
Finishing URL
about:privatebrowsing
IP / ASN
185.199.108.133
#54113 FASTLY
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com
358022014-02-062014-03-012024-11-27

Related reports

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
raw.githubusercontent.com/MangoManRbX/Moonware-/refs/heads/main/MoonWareGit.zip
IP / ASN
185.199.110.133
#54113 FASTLY
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=store
Size3.4 MB (3408275 bytes)
MD5d694ba43746f1c2a09bbebe17295131f
SHA14b7b63df44afcaca97faa628b3f98434b002d4e9
Archive (22)
FilenameMD5File type
libcrypto-3-x64.dllbe0f6d1d60e149cedaca33a04963e05fPE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
libssl-3-x64.dll733e3b58ee1760a442fec4712848c3adPE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
Xeno.dll793b46d5dbcdac15c172910be1adbb72PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
Xeno_original.dllb5f9a613a2cb0dbc4f1e6d45d7977b2bPE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
xxhash.dll70c514826d9428f184d27f0c8f397404PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
zstd.dll5b96fb0d4e6453680da278f5b7e51a29PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
cxapis.dll4ae4a4a268ccd36acffa1674ebbf910ePE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
FastColoredTextBox.dll8610f4d3cdc6cc50022feddced9fdaebPE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
FastColoredTextBox.xml70d49dec6a333f1d94fb1e77c663525cXML 1.0 document, ASCII text, with CRLF line terminators
Moonware V1.exe2c6a652acebc4ecf7d797f90a48a5eb9PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
Moonware V1.exe.config15c8c4ba1aa574c0c00fd45bb9cce1abXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Moonware V1.pdbc1948428d71eb5610a6eabe969d7eba0MSVC program database ver 7.00, 512*91 bytes
appendfile.txt260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
getcustomasset.txt260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
isfile.txt260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
test_1.txt260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
test_2.txt260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
loadfile.txt8fa14cdd754f91cc6554c9e71929cce7very short file (no magic)
readfile.txt260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
writefile260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
writefile.txt260ca9dd8a4577fc00b7bd5810298076ASCII text, with no line terminators
IY_FE.iy291d5636a434c4f1ceb0f3f776c2a51fJSON text data

Detections

AnalyzerVerdictAlert
YARAhub by abuse.chmalware
Detect pe file that no import table
YARAhub by abuse.chmalware
Detect pe file that no import table
VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize