Report Overview

  1. Submitted URL

    github.com/errias/Kyoku-Cookie-Token-Stealer/archive/refs/heads/main.zip

  2. IP

    140.82.121.3

    ASN

    #36459 GITHUB

  3. Submitted

    2024-05-10 06:07:38

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
codeload.github.com623592007-10-092013-04-182024-05-08

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/errias/Kyoku-Cookie-Token-Stealer/zip/refs/heads/main

  2. IP

    140.82.121.10

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    298 kB (297554 bytes)

  2. Hash

    b60094c9e776305d6c7d64876ebd4cb0

    8ead8b00758209c9d252311dfbe30abe87dd9305

  1. Archive (14)

  2. FilenameMd5File type
    .gitignore
    6482f9d8254f7f75af96c66a09031e65
    ASCII text
    LICENSE
    d88e9e08385d2a17052dac348bde4bc1
    ASCII text
    README.md
    818e856c72532d9609ed3632991ef46c
    Unicode text, UTF-8 text
    build.bat
    298180c28e02aa9bfd4e45803b3fb3c9
    DOS batch file, ASCII text, with CRLF line terminators
    builder.py
    fc3b8deb42fd97bf276d2f1679d753a5
    Python script, ASCII text executable, with CRLF line terminators
    bg.png
    c73b2545d6a0c338fc347ed74b06011a
    PNG image data, 1920 x 512, 8-bit/color RGBA, non-interlaced
    footer.png
    a7d50223d0dedc64c4722572beeddc1a
    PNG image data, 1920 x 512, 8-bit/color RGBA, non-interlaced
    pcinfo.png
    ededddb6cd32c49d89dd834aa812c131
    PNG image data, 407 x 323, 8-bit/color RGBA, non-interlaced
    rbinfo.png
    3bb21eef0e72a479a26d21bac1e655f4
    PNG image data, 557 x 468, 8-bit/color RGBA, non-interlaced
    screenshot.png
    88a85430abaf5318e41d07a64e54aac1
    PNG image data, 446 x 302, 8-bit/color RGBA, non-interlaced
    user.png
    032b6b6d15cf800287fe3aa5e0dffa32
    PNG image data, 595 x 404, 8-bit/color RGBA, non-interlaced
    kyoku-main.py
    d9fd8ca0bd3ab75fcb73519685bc24df
    Python script, Unicode text, UTF-8 text executable, with very long lines (6402), with CRLF line terminators
    please read me.txt
    7c894945a5c71b1e74bd9cc154fd3985
    ASCII text
    requirements.txt
    ba9f9962127161efd331031386194519
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/errias/Kyoku-Cookie-Token-Stealer/archive/refs/heads/main.zip
140.82.121.3302 Found0 B
codeload.github.com/errias/Kyoku-Cookie-Token-Stealer/zip/refs/heads/main
140.82.121.10200 OK298 kB