Report Overview

  1. Visited public
    2024-11-06 21:37:06
    Tags
    Submit Tags
  2. URL

    github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/archive/refs/heads/main.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
10

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-11-06
codeload.github.com623592007-10-092013-04-182024-11-06

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/zip/refs/heads/main

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    1.1 MB (1085630 bytes)

  2. Hash

    6821f16ddc8550a5708b21193c0016fe

    76dffa194d3401eff93f92d6be6a83c7606a62da

  1. Archive (22)

  2. FilenameMd5File type
    .gitattributes
    05bdb783ee6514c8c072e47680af8ff7
    ASCII text
    LICENSE
    db95b6e40dc7d26d8308b6b7375637b6
    ASCII text
    README.md
    db51ab375e99bbc342bc4721804d4999
    ASCII text
    Spike.exe
    09f9f88fae6402b459804117bc59ac69
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    Box.bat
    02ff5b19e687f2a85d764d4157e9b391
    DOS batch file, ASCII text
    Button.bat
    1099cd46cd19d652464dfab424b1a7bf
    DOS batch file, ASCII text
    Adapters.exe
    934bbc5411c532964f3bbe42cb1c1785
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    Adapters2.exe
    bb36d4578ce201dc932ab6bbc079875c
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    AlternateStreamView.cfg
    46995c18741e783077948528234b83ba
    ASCII text
    AlternateStreamView.exe
    caede4f12ac17f3e0ad8e3c923fd510a
    PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
    Block.exe
    5782b8d469bbc9045ebd2316c2aefbd5
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    UnbanComplete.vbs
    598379a2b7fd1ae90b1c6ca0187fe0fe
    ASCII text, with no line terminators
    process.bat
    f7f05d297826cb0c0a428c2141aa58dc
    ASCII text
    spoofer.sys
    96756deaff1b2667883d4a21e43f4f65
    PE32+ executable (native) x86-64, for MS Windows, 5 sections
    GetInput.exe
    2ba62ae6f88b11d0e262af35d8db8ca9
    PE32 executable (console) Intel 80386, for MS Windows, 3 sections
    Getlen.bat
    78827b3cbbf31f0d28ef5baabd613965
    DOS batch file, ASCII text
    Volumeid64.exe
    81a45f1a91448313b76d2e6d5308aa7a
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    batbox.exe
    cb4a44baa20ad26bf74615a7fc515a84
    PE32 executable (console) Intel 80386, for MS Windows
    colorecho-vc10-x86_64.exe
    e2f377052409beeebf852803734e007a
    PE32+ executable (console) x86-64, for MS Windows, 5 sections
    host.txt
    f7418c2f57b5bfd8ac7fed9679dec46d
    ASCII text
    hwid.ps1
    0ccd1a013777fcf556942eb1b16ec5df
    ASCII text
    mac.txt
    e91018b5a21204d4fce7945ddb7bf032
    ASCII text

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
GET github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/archive/refs/heads/main.zip
140.82.121.4302 Found0 B
GET codeload.github.com/Spaceware-Technologies/HWID-Spoofer-For-VRC/zip/refs/heads/main
140.82.121.9200 OK1.1 MB