Report Overview

  1. Submitted URL

    github.com/Wu-Patrick/-1.1/raw/master/%E6%96%87%E7%8C%AE%E8%BD%AC%E6%8D%A2%E7%B3%BB%E7%BB%9F2.0.exe

  2. IP

    140.82.121.4

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-23 15:52:10

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-04-22
github.com14232007-10-092016-07-132024-03-24

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/Wu-Patrick/-1.1/master/%E6%96%87%E7%8C%AE%E8%BD%AC%E6%8D%A2%E7%B3%BB%E7%BB%9F2.0.exeIdentifies executable converted using PyInstaller.

Files detected

  1. URL

    raw.githubusercontent.com/Wu-Patrick/-1.1/master/%E6%96%87%E7%8C%AE%E8%BD%AC%E6%8D%A2%E7%B3%BB%E7%BB%9F2.0.exe

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections

    Size

    13 MB (12606818 bytes)

  2. Hash

    6d41cff010f9212cee37a73b91dadfd8

    99c95ab2df0ae541d763d7190a3d636e39e631d2

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies executable converted using PyInstaller.
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/Wu-Patrick/-1.1/raw/master/%E6%96%87%E7%8C%AE%E8%BD%AC%E6%8D%A2%E7%B3%BB%E7%BB%9F2.0.exe
140.82.121.4302 Found0 B
raw.githubusercontent.com/Wu-Patrick/-1.1/master/%E6%96%87%E7%8C%AE%E8%BD%AC%E6%8D%A2%E7%B3%BB%E7%BB%9F2.0.exe
185.199.109.133200 OK13 MB