Report Overview
- Visited public2024-11-06 21:37:06TagsSubmit Tags
- URL
github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/archive/refs/heads/main.zip
- Finishing URL
about:privatebrowsing
- IP / ASN
140.82.121.4
#36459 GITHUB
Titleabout:privatebrowsing
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
github.com | 1423 | 2007-10-09 | 2016-07-13 | 2024-11-06 | 536 B | 3.9 kB | ![]() |
codeload.github.com | 62359 | 2007-10-09 | 2013-04-18 | 2024-11-06 | 537 B | 1.1 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Mnemonic Secure DNS
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
codeload.github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/zip/refs/heads/main
IP
140.82.121.9
ASN
#36459 GITHUB
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
1.1 MB (1085630 bytes)
Hash
6821f16ddc8550a5708b21193c0016fe
76dffa194d3401eff93f92d6be6a83c7606a62da
Archive (22)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
.gitattributes | 05bdb783ee6514c8c072e47680af8ff7 | ASCII text | ||||||
LICENSE | db95b6e40dc7d26d8308b6b7375637b6 | ASCII text | ||||||
README.md | db51ab375e99bbc342bc4721804d4999 | ASCII text | ||||||
Spike.exe | 09f9f88fae6402b459804117bc59ac69
| PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections | ||||||
Box.bat | 02ff5b19e687f2a85d764d4157e9b391 | DOS batch file, ASCII text | ||||||
Button.bat | 1099cd46cd19d652464dfab424b1a7bf | DOS batch file, ASCII text | ||||||
Adapters.exe | 934bbc5411c532964f3bbe42cb1c1785
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||
Adapters2.exe | bb36d4578ce201dc932ab6bbc079875c
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||
AlternateStreamView.cfg | 46995c18741e783077948528234b83ba | ASCII text | ||||||
AlternateStreamView.exe | caede4f12ac17f3e0ad8e3c923fd510a | PE32+ executable (GUI) x86-64, for MS Windows, 5 sections | ||||||
Block.exe | 5782b8d469bbc9045ebd2316c2aefbd5
| PE32+ executable (GUI) x86-64, for MS Windows, 6 sections | ||||||
UnbanComplete.vbs | 598379a2b7fd1ae90b1c6ca0187fe0fe | ASCII text, with no line terminators | ||||||
process.bat | f7f05d297826cb0c0a428c2141aa58dc | ASCII text | ||||||
spoofer.sys | 96756deaff1b2667883d4a21e43f4f65
| PE32+ executable (native) x86-64, for MS Windows, 5 sections | ||||||
GetInput.exe | 2ba62ae6f88b11d0e262af35d8db8ca9
| PE32 executable (console) Intel 80386, for MS Windows, 3 sections | ||||||
Getlen.bat | 78827b3cbbf31f0d28ef5baabd613965 | DOS batch file, ASCII text | ||||||
Volumeid64.exe | 81a45f1a91448313b76d2e6d5308aa7a | PE32+ executable (console) x86-64, for MS Windows, 6 sections | ||||||
batbox.exe | cb4a44baa20ad26bf74615a7fc515a84
| PE32 executable (console) Intel 80386, for MS Windows | ||||||
colorecho-vc10-x86_64.exe | e2f377052409beeebf852803734e007a | PE32+ executable (console) x86-64, for MS Windows, 5 sections | ||||||
host.txt | f7418c2f57b5bfd8ac7fed9679dec46d | ASCII text | ||||||
hwid.ps1 | 0ccd1a013777fcf556942eb1b16ec5df | ASCII text | ||||||
mac.txt | e91018b5a21204d4fce7945ddb7bf032 | ASCII text |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
GET github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/archive/refs/heads/main.zip | ![]() | 302 Found | 0 B | |||||||
HTTP Headers
| ||||||||||
GET codeload.github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/zip/refs/heads/main | ![]() | 200 OK | 1.1 MB | |||||||
Detections
HTTP Headers
| ||||||||||