Report Overview

  1. Visited public
    2024-12-11 09:10:22
    Tags
  2. URL

    raw.githubusercontent.com/mhemon404/project01/main/system404.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    185.199.110.133

    #54113 FASTLY

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
12

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-12-11

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/mhemon404/project01/main/system404.exeCobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x
mediumraw.githubusercontent.com/mhemon404/project01/main/system404.exeDetects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
mediumraw.githubusercontent.com/mhemon404/project01/main/system404.exemeth_peb_parsing
mediumraw.githubusercontent.com/mhemon404/project01/main/system404.exeWindows.Trojan.Metasploit
mediumraw.githubusercontent.com/mhemon404/project01/main/system404.exeCobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/mhemon404/project01/main/system404.exe

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections

    Size

    74 kB (73802 bytes)

  2. Hash

    5cf4fd83c632025a479544de58d05c7e

    911c13319381c254b5b4b768e11628cb08c4cd59

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Cobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x
    Public Nextron YARA rulesmalware
    Detects imphash often found in malware samples (Zero hits with with search for 'imphash:x p:0' on Virustotal)
    YARAhub by abuse.chmalware
    meth_peb_parsing
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Metasploit
    Google GCTI YARA rulesmalware
    Cobalt Strike's resources/reverse.bin signature for versions 2.5 to 4.x
    VirusTotalmalicious
    ClamAVmalicious
    Win.Trojan.Swrort-5710536-0

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/mhemon404/project01/main/system404.exe
185.199.109.133200 OK74 kB