{"report_id":"beb020fe-d5e4-4498-83a8-6f2d45a54083","version":6,"status":"done","tags":[],"date":"2024-11-29T16:18:27Z","url":{"schema":"http","addr":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","fqdn":"raw.githubusercontent.com","domain":"raw.githubusercontent.com","tld":"githubusercontent.com"},"ip":{"addr":"185.199.110.133","port":0,"asn":54113,"as":"FASTLY","country":"United States","country_code":"US"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"","expires_at":"2027-02-07T16:18:27Z","useragent":"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"raw.githubusercontent.com","ip":{"addr":"185.199.110.133","port":443,"asn":54113,"as":"FASTLY","country":"United States","country_code":"US"},"domain_registered":"2014-02-06","domain_rank":35802,"first_seen":"2014-03-01T08:08:08Z","last_seen":"2024-11-27T03:21:44.516068Z","alert_count":1,"request_count":1,"received_data":36223,"sent_data":555,"comment":"","tags":null,"fingerprints":null}],"files":[{"md5":"61dcdcdc82221e6eaa61be861362c8f4","sha1":"12f177b9f8924f6cd5c9957cdfc3fc63db27ca7e","sha256":"a364ca04524bbfd09c840d4d0e4d9b8e6ee72fe87db8e400ddc3ec9dc8cdbfd3","sha512":"c2c29312a3441fdbd0bbfa2770837e1d82a38fe5619434bb1a97442207d46a4bec8ba6d80116c44b00af27f71889ff11b8385ba1dde38fe2b0e3737507a16687","magic":"PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections","size":35328,"url":{"schema":"https","addr":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","fqdn":"raw.githubusercontent.com","domain":"raw.githubusercontent.com","tld":"githubusercontent.com"},"ip":{"addr":"185.199.110.133","port":443,"asn":54113,"as":"FASTLY","country":"United States","country_code":"US"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","trigger":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"iam-py-test","date":"2022-11-19","description":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","false_positives":"Files modifying Defender for legitimate purposes, files containing registry keys related to Defender (i.e. diagnostic tools)","rule":"Disable_Defender","yarahub_author_twitter":"@iam_py_test","yarahub_license":"CC0 1.0","yarahub_reference_md5":"799a7f1507e5e7328081a038987e9a6f","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"1fcd3702-cf5b-47b4-919d-6372c5412151"}}]}}],"artifacts":{"windows_shortcuts":null,"files":[{"md5":"61dcdcdc82221e6eaa61be861362c8f4","sha1":"12f177b9f8924f6cd5c9957cdfc3fc63db27ca7e","sha256":"a364ca04524bbfd09c840d4d0e4d9b8e6ee72fe87db8e400ddc3ec9dc8cdbfd3","sha512":"c2c29312a3441fdbd0bbfa2770837e1d82a38fe5619434bb1a97442207d46a4bec8ba6d80116c44b00af27f71889ff11b8385ba1dde38fe2b0e3737507a16687","magic":"PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections","size":35328,"url":{"schema":"https","addr":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","fqdn":"raw.githubusercontent.com","domain":"raw.githubusercontent.com","tld":"githubusercontent.com"},"ip":{"addr":"185.199.110.133","port":443,"asn":54113,"as":"FASTLY","country":"United States","country_code":"US"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","trigger":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"iam-py-test","date":"2022-11-19","description":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","false_positives":"Files modifying Defender for legitimate purposes, files containing registry keys related to Defender (i.e. diagnostic tools)","rule":"Disable_Defender","yarahub_author_twitter":"@iam_py_test","yarahub_license":"CC0 1.0","yarahub_reference_md5":"799a7f1507e5e7328081a038987e9a6f","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"1fcd3702-cf5b-47b4-919d-6372c5412151"}}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":null}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","trigger":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"iam-py-test","date":"2022-11-19","description":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","false_positives":"Files modifying Defender for legitimate purposes, files containing registry keys related to Defender (i.e. diagnostic tools)","rule":"Disable_Defender","yarahub_author_twitter":"@iam_py_test","yarahub_license":"CC0 1.0","yarahub_reference_md5":"799a7f1507e5e7328081a038987e9a6f","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"1fcd3702-cf5b-47b4-919d-6372c5412151"}}]},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"mnemonic_dns","type":"domain","description":"Mnemonic Secure DNS","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":null},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"https","addr":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","fqdn":"raw.githubusercontent.com","domain":"raw.githubusercontent.com","tld":"githubusercontent.com"},"ip":{"addr":"185.199.110.133","port":443,"asn":54113,"as":"FASTLY","country":"United States","country_code":"US"},"is_navigation_request":true,"resource_type":"document","requested_by":"","date":"2024-11-29T16:18:02.717Z","timestamp":1732897082717,"http_version":"HTTP/2","security_state":"secure","security_info":{"cipher_suite":"TLS_AES_128_GCM_SHA256","key_group_name":"x25519","signature_name":"RSA-PSS-SHA256","protocol":"TLSv1.3","cert":{"subject":{"commonName":"*.github.io","organization":"GitHub, Inc."},"issuer":{"commonName":"DigiCert Global G2 TLS RSA SHA256 2020 CA1","organization":"DigiCert Inc"},"validity":{"start":"Fri, 15 Mar 2024 00:00:00 GMT","end":"Fri, 14 Mar 2025 23:59:59 GMT"},"fingerprint":{"sha1":"97:D8:C5:70:0F:12:24:6C:88:BC:FA:06:7E:8C:A7:4D:A8:62:67:28","sha256":"09:01:0C:CE:9B:72:21:55:C7:E6:86:B0:77:39:D3:D2:DC:06:05:DE:A1:A4:98:4A:0B:96:5E:18:77:77:26:B5"}}},"request":{"raw":"GET /rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe HTTP/1.1\r\nHost: raw.githubusercontent.com\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate, br\r\nDNT: 1\r\nUpgrade-Insecure-Requests: 1\r\nConnection: keep-alive\r\nSec-Fetch-Dest: document\r\nSec-Fetch-Mode: navigate\r\nSec-Fetch-Site: cross-site\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/2 200 OK\r\ncache-control: max-age=300\r\ncontent-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox\r\ncontent-type: application/octet-stream\r\netag: W/\"cc09976d996ca27bac2570e1bad1e1361ec75adea79825abd80d1bae04c9a7f3\"\r\nstrict-transport-security: max-age=31536000\r\nx-content-type-options: nosniff\r\nx-frame-options: deny\r\nx-xss-protection: 1; mode=block\r\nx-github-request-id: 7DD6:3D17E2:CAF80F:D37A65:6749E93A\r\naccept-ranges: bytes\r\ndate: Fri, 29 Nov 2024 16:18:02 GMT\r\nvia: 1.1 varnish\r\nx-served-by: cache-hel1410020-HEL\r\nx-cache: MISS\r\nx-cache-hits: 0\r\nx-timer: S1732897083.764523,VS0,VE127\r\nvary: Authorization,Accept-Encoding,Origin\r\naccess-control-allow-origin: *\r\ncross-origin-resource-policy: cross-origin\r\nx-fastly-request-id: e54f86a8d890b36f5fc32f23bc830a95c4febac7\r\nexpires: Fri, 29 Nov 2024 16:23:02 GMT\r\nsource-age: 0\r\ncontent-length: 35328\r\nX-Firefox-Spdy: h2\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":35328,"size_decoded":35328,"mime_type":"application/octet-stream","magic":"PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections","md5":"61dcdcdc82221e6eaa61be861362c8f4","sha1":"12f177b9f8924f6cd5c9957cdfc3fc63db27ca7e","sha256":"a364ca04524bbfd09c840d4d0e4d9b8e6ee72fe87db8e400ddc3ec9dc8cdbfd3","sha512":"c2c29312a3441fdbd0bbfa2770837e1d82a38fe5619434bb1a97442207d46a4bec8ba6d80116c44b00af27f71889ff11b8385ba1dde38fe2b0e3737507a16687","ssdeep":"768:ICB/mZMXnTgjjSxKSPSsiwtgxVAUTXbOfq12k4sbv:IIxTghGMhAUjbO44sD","tlshash":"f8f22b1aa79cc12bd39f0ebd386116610231e6561e03dbe60dcd64ffa8a7740461a7db","first_seen":"2024-11-29T16:18:28.102583Z","last_seen":"2024-11-29T16:18:38.301704Z","times_seen":2,"resource_available":false,"data":null}},"time_used":224,"timings":{"blocked":39,"dns":3,"connect":13,"send":0,"wait":141,"receive":5,"ssl":20},"alerts":{"ids":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-29","alert":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","trigger":"raw.githubusercontent.com/rosarioian6/rainVExploitghy/refs/heads/rainnVExploit-pages/rainVExploit.exe","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"iam-py-test","date":"2022-11-19","description":"Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen","false_positives":"Files modifying Defender for legitimate purposes, files containing registry keys related to Defender (i.e. diagnostic tools)","rule":"Disable_Defender","yarahub_author_twitter":"@iam_py_test","yarahub_license":"CC0 1.0","yarahub_reference_md5":"799a7f1507e5e7328081a038987e9a6f","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"1fcd3702-cf5b-47b4-919d-6372c5412151"}}],"urlquery":null}}]}
