Report Overview

  1. Visited public
    2024-10-22 14:17:06
    Tags
  2. URL

    raw.githubusercontent.com/starkvps007/app/refs/heads/main/tolly.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    185.199.108.133

    #54113 FASTLY

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-10-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/starkvps007/app/refs/heads/main/tolly.zip

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    29 kB (29359 bytes)

  2. Hash

    0c72eb543631ae328e2c0ba9aec714ea

    925e5964d36f1d8329ccd2ee3f873777d2823f36

  1. Archive (5)

  2. FilenameMd5File type
    BypassBest.php
    75daa0902d0a21c52273432e34fa630a
    PHP script, ASCII text, with very long lines (32403)
    hello.php
    5e82d748aa12d1019fe53d3e0c0eb5ae
    PHP script, ASCII text, with very long lines (308)
    readme.txt
    a0a9112830072d0b51aa34eaefb62f50
    ASCII text
    style.php
    eff18051344566a0283b940db29acce2
    PHP script, ASCII text
    wp-22.php
    c4e69cc3663b67c00868f4be5c4e6ff7
    PHP script, ASCII text, with very long lines (14580), with no line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    PHP webshell obfuscated by encoding of mixed hex and dec
    Public Nextron YARA rulesmalware
    PHP webshell which eval()s obfuscated string
    Public Nextron YARA rulesmalware
    Known PHP Webshells which contain unique strings, lousy rule for low hanging fruits. Most are catched by other rules in here but maybe these catch different versions.
    Public Nextron YARA rulesmalware
    typical webshell strings, suspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/starkvps007/app/refs/heads/main/tolly.zip
185.199.109.133200 OK29 kB