Report Overview
Visitedpublic
2025-02-16 00:55:24
Tags
Submit Tags
URL
raw.githubusercontent.com/sopranotech/dimeo/main/WinRing0x64.sys
Finishing URL
about:privatebrowsing
IP / ASN
185.199.111.133
#54113 FASTLY
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Host Summary

HostRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com
358022014-02-062014-03-012025-02-12

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/sopranotech/dimeo/main/WinRing0x64.sysDetects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - WinRing0x64.sys
mediumraw.githubusercontent.com/sopranotech/dimeo/main/WinRing0x64.syssigned_sys_with_vulnerablity

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
raw.githubusercontent.com/sopranotech/dimeo/main/WinRing0x64.sys
IP / ASN
185.199.111.133
#54113 FASTLY
File Overview
File TypePE32+ executable (native) x86-64, for MS Windows, 6 sections
Size14 kB (14544 bytes)
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - WinRing0x64.sys
YARAhub by abuse.chmalware
signed_sys_with_vulnerablity
VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize