Report Overview
Visitedpublic
2024-12-29 17:05:54
Tags
Submit Tags
URL
github.com/ValdikSS/GoodbyeDPI/releases/download/0.2.3rc2/goodbyedpi-0.2.3rc2.zip
Finishing URL
about:privatebrowsing
IP / ASN
140.82.121.4
#36459 GITHUB
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
github.com
14232007-10-092016-07-132024-12-25
objects.githubusercontent.com
1340602014-02-062021-11-012024-12-25

Related reports

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
objects.githubusercontent.com/github-production-release-asset-2e65be/91493088/46f83bda-2730-48ca-bc92-54102e2af783?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20241229%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20241229T170529Z&X-Amz-Expires=300&X-Amz-Signature=f206856bb8bc28103b0588ae699acebf6b72c439bcdcc860e46585a5a46647b3&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dgoodbyedpi-0.2.3rc2.zip&response-content-type=application%2Foctet-stream
IP / ASN
185.199.110.133
#54113 FASTLY
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=store
Size1.1 MB (1083625 bytes)
MD56fc25f0c7044a292fb67bd6ba063d900
SHA128e9d01a471f4ff0228cfe9af1958e4d4d97c6fd
Archive (25)
FilenameMD5File type
LICENSE-getline.txt3a7edebc3612bcea2306f73b92342a44ASCII text, with CRLF line terminators
LICENSE-goodbyedpi.txtc4082b6c254c9fb71136710391d9728bASCII text, with CRLF line terminators
LICENSE-uthash.txt5cc1f1e4c71f19f580458586756c02b4ASCII text
LICENSE-windivert.txtb864fbb188a7c3a11cef80f3ee902d77ASCII text, with CRLF line terminators
WinDivert.dll1cb0efd60883b5637b31bf46c34ae199PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
WinDivert32.syscd477ee96ff05cacda8ac3c0e9316d7aPE32 executable (native) Intel 80386, for MS Windows, 6 sections
WinDivert64.sys6a33620de63bccaf5e5314ee49cd58fbPE32+ executable (native) x86-64, for MS Windows, 8 sections
goodbyedpi.execa4bb8e03aef6cd3681f3f5d22420688PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, 11 sections
WinDivert.dll88e1c19b978436258f7c938013408a8aPE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections
WinDivert64.sys6a33620de63bccaf5e5314ee49cd58fbPE32+ executable (native) x86-64, for MS Windows, 8 sections
goodbyedpi.exe17d48981add03f748a33175d19d305a5PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 12 sections
0_russia_update_blacklist_file.cmda6af4b081a4cbcd448759306b2366eacDOS batch file, ASCII text
1_russia_blacklist.cmd76763259e528cd27e998fb4c665c2b78DOS batch file, ASCII text
1_russia_blacklist_dnsredir.cmd06018c5958cddd1d0cf3135762aeb2ebDOS batch file, ASCII text
2_any_country.cmd72103c58f2ed536ebc07e19fd00fa2f0DOS batch file, ASCII text
2_any_country_dnsredir.cmd77048213eb9358ff71f99667dd08034bDOS batch file, ASCII text
service_install_russia_blacklist.cmdaf6dac6686b77dc51203800737f41b75DOS batch file, ASCII text
service_install_russia_blacklist_dnsredir.cmd77b1d63472e67c4368961c463cc1d92cDOS batch file, ASCII text
service_remove.cmd204b35d000d6b29c1102b1d8b6a63dc7DOS batch file, ASCII text
russia-blacklist.txtc778017427c08556621c3360e7b60b12ASCII text
russia-youtube.txt91d74100607dba77eda0d7a75dacb0ccASCII text
1_russia_blacklist_YOUTUBE.cmd2627a5d6391bf8e824ecebecb370c09eDOS batch file, ASCII text
service_install_russia_blacklist_YOUTUBE.cmd13a3550b6edd5b95127889f95b79c764DOS batch file, ASCII text
service_install_russia_blacklist_YOUTUBE_ALT.cmde2ba1aaf4a89b8f271ca78f3598054caDOS batch file, ASCII text
1_russia_blacklist_YOUTUBE_ALT.cmd61d122cea83daa938ccc8fe87a5b8d97DOS batch file, ASCII text

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Detects WinDivert User-Mode packet capturing driver
Public Nextron YARA rulesmalware
Detects WinDivert User-Mode packet capturing driver
VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize