Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
github.com | 1423 | 2007-10-09 | 2016-07-13 | 2024-10-30 | 527 B | 4.3 kB | ![]() |
objects.githubusercontent.com | 134060 | 2014-02-06 | 2021-11-01 | 2024-10-30 | 964 B | 7.2 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Mnemonic Secure DNS
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
objects.githubusercontent.com/github-production-release-asset-2e65be/794810266/4f736a50-67ac-4b56-9cd4-47935b6c0965?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20241101%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20241101T191501Z&X-Amz-Expires=300&X-Amz-Signature=4c816951102557040acca72fc8cf10fd346b059cb1de966a725dad870b3a5dc0&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DPPPwnGo-v2.8-1028.zip&response-content-type=application%2Foctet-stream
IP
185.199.108.133
ASN
#54113 FASTLY
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
7.2 MB (7213104 bytes)
Hash
4865097c4340b365430e409a282850b8
60eee6312813a15205758d59e0f7c3918dd9d1f8
Archive (91)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
stage2.bin | c976d00ec889926f2ac9fab2fd40ecfa | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
stage2.bin | bca7c2f584489f552b37d0867812be2f | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
stage2.bin | bca7c2f584489f552b37d0867812be2f | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
stage2.bin | bca7c2f584489f552b37d0867812be2f | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
stage2.bin | 6b954dd1bab01a79c7f7033ae6d1fe71 | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
stage2.bin | 6b954dd1bab01a79c7f7033ae6d1fe71 | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
stage2.bin | 6b954dd1bab01a79c7f7033ae6d1fe71 | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
stage2.bin | 0c43112d611c3723adb27010c28a5c52 | DOS executable (COM), start instruction 0xe96e0700 00534889 | ||||||
Wait for other FWs | d41d8cd98f00b204e9800998ecf8427e | |||||||
Payload˵��readme.txt | 56812b74f96d715f779fecc5399862fe | Unicode text, UTF-8 text, with CRLF line terminators | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
payload.bin | a09599036497c3554dd6a73fb71f7812 | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | aeae08a07e580545066b5e28e208dd4f | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | 4c6f0ccc08e5c7d6399d24e7817b7e3f | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | 7bc8b565a82eddf7fe70b34311be86ac | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
goldhen.bin | 9bf90ebe4f19699e41eaad1071392c6d | DOS executable (COM), start instruction 0xe9661000 00f30f1e | ||||||
goldhen.bin | db7ed7262f90d2f9f8342b1ae57179f5 | DOS executable (COM), start instruction 0xe9661000 00f30f1e | ||||||
GoldHEN vs VTX.png | 5fabbff85db7895beb2018b66d4c2e5a | PNG image data, 480 x 550, 8-bit/color RGBA, non-interlaced | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
goldhen.bin | 78c655db47c395434715fce94fa86743 | DOS executable (COM), start instruction 0xe9861100 00f30f1e | ||||||
payload.bin | 259a2fbed349517939de90fd3cf102ca | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | 259a2fbed349517939de90fd3cf102ca | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | 259a2fbed349517939de90fd3cf102ca | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | bd70d7919dd2e0f8cb8df59c7e7bc413 | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | bd70d7919dd2e0f8cb8df59c7e7bc413 | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | bd70d7919dd2e0f8cb8df59c7e7bc413 | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | db1de0517866663ec98ab0b99d2ce3ab | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | db1de0517866663ec98ab0b99d2ce3ab | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | 5ef1339fe2741d12a31d68dd3050e8bd | DOS executable (COM), start instruction 0xe9940200 00f30f1e | ||||||
payload.bin | d9f75cf066b06470b7b759f81fa87ef3 | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
payload.bin | 540a9e6326a6001207fa3631b1c48275 | DOS executable (COM), start instruction 0xe9970200 00f30f1e | ||||||
stage2.bin | 1ae8c6d283a37ff3168c3401ac4e86a0 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | bfd749cd25b34373ba0184dc16165f3e | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | 1ae8c6d283a37ff3168c3401ac4e86a0 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | bfd749cd25b34373ba0184dc16165f3e | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | 1ae8c6d283a37ff3168c3401ac4e86a0 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | bfd749cd25b34373ba0184dc16165f3e | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | ca16956520dc8ce111856491aff89917 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | 43d399fb566f47eaf0f21ab51893b661 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | ca16956520dc8ce111856491aff89917 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | 43d399fb566f47eaf0f21ab51893b661 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | 3967e107d97c66571b425377dc90ba2b | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | 9da51f25f4f326952350124f6289fa84 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | 9da51f25f4f326952350124f6289fa84 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | bf4e3a7df4dd01a29300cb57c0323620 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
stage2.bin | bf4e3a7df4dd01a29300cb57c0323620 | DOS executable (COM), start instruction 0xe96e0100 00534889 | ||||||
PPPwnGo.exe | 1f2e533441f0511252c4505c10143463
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
CPP_debug.ini | 4af5301123a3a8d83ee2367e8f101e78 | Unicode text, UTF-8 text, with CRLF line terminators | ||||||
README.md | 9f4246fce21dcf5bbeb9df5308cd48eb | Unicode text, UTF-8 text | ||||||
˵��.txt | 45fad2b9eb1d96a8380e480c0d3edc4c | Unicode text, UTF-8 text | ||||||
4.��װpip��˫����.bat | 58194b2a72727206780a3f6f0a1e51ae | ASCII text, with CRLF line terminators | ||||||
3.��װpython.txt | e69c776da0a2dda5c3927a1205f05c0f | Unicode text, UTF-8 text, with CRLF line terminators | ||||||
2.add Python to Path.png | d6cb744eaec2c33afc6ba4c3ed93a028 | PNG image data, 400 x 378, 8-bit/color RGB, non-interlaced | ||||||
1.��װnpcap.txt | 699cdd28ed8cbc82f5f413bad33941cb | Unicode text, UTF-8 text, with CRLF line terminators | ||||||
5.��װscapy��˫����.bat | f75b5994777a0da1a7fdcda28546f454 | ASCII text, with CRLF, LF line terminators | ||||||
pppwn.py | c1908b4da915c4908f9d35fac921b709 | Python script, ASCII text executable | ||||||
offsets.py | d2cff007676aa9ba533bb831b9a7dfa6 | ASCII text | ||||||
pppwn.exe | ba2c3b1abcde339d0597ea0e32619b59
| PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 3 sections | ||||||
pppwn.exe | 87fd8e2c384052e9bfba97a92e4cd308
| PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 3 sections | ||||||
pppwn.exe | 520f94f2f218bd549e0dc2fbb9201bc9
| PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 3 sections | ||||||
pppwn.exe | 199f3d26b818603f961b0995aa5271b4
| PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 3 sections | ||||||
Go_debug.ini | 415080b598b8e97f7a4da0314da57cd1 | ASCII text, with CRLF line terminators | ||||||
ReadMe.txt | 01c189b3483685952ad05fb01c6400e1 | Unicode text, UTF-8 text, with CRLF line terminators | ||||||
stage1.bin | 99b8083ac07bed4bf555f0ec02a7ffa4 | data | ||||||
stage1.bin | 99b8083ac07bed4bf555f0ec02a7ffa4 | data | ||||||
stage1.bin | 44f3cc05520077899c0cd51422811013 | data | ||||||
stage1.bin | 44f3cc05520077899c0cd51422811013 | data | ||||||
stage1.bin | 44f3cc05520077899c0cd51422811013 | data | ||||||
stage1.bin | 565a3867eb66b0baafdeb812037c95f8 | data | ||||||
stage1.bin | 1da7b4d77bcb45cbfef127c0b2892284 | data | ||||||
stage1.bin | 1da7b4d77bcb45cbfef127c0b2892284 | data | ||||||
stage1.bin | 1da7b4d77bcb45cbfef127c0b2892284 | data | ||||||
stage1.bin | 8f8d7e2777d51905e5b4e15a27a38219 | data | ||||||
stage1.bin | 8f8d7e2777d51905e5b4e15a27a38219 | data | ||||||
stage1.bin | 8f8d7e2777d51905e5b4e15a27a38219 | data | ||||||
stage1.bin | 896e8f979ea9621107546b49ec00ed86 | data | ||||||
stage1.bin | 896e8f979ea9621107546b49ec00ed86 | data | ||||||
stage1.bin | 896e8f979ea9621107546b49ec00ed86 | data | ||||||
stage1.bin | 411aab2f9f2947d66286c9dd8c9b7a63 | data | ||||||
stage1.bin | 411aab2f9f2947d66286c9dd8c9b7a63 | data | ||||||
stage1.bin | ab7db32dbe6c6e4e8f80d642a41f5d05 | data | ||||||
stage1.bin | e372c39870ae642dd32c28122f6727c9 | data | ||||||
stage1.bin | e372c39870ae642dd32c28122f6727c9 | data | ||||||
stage1.bin | 57749fe2519d4b987da8a4291d1d9fd7 | data | ||||||
stage1.bin | 57749fe2519d4b987da8a4291d1d9fd7 | data | ||||||
stage1.bin | 57749fe2519d4b987da8a4291d1d9fd7 | data |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits |
Public Nextron YARA rules | malware | Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits |
YARAhub by abuse.ch | malware | pe_detect_tls_callbacks |
YARAhub by abuse.ch | malware | pe_detect_tls_callbacks |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
github.com/PSGO/PPPwnGo/releases/download/v2.8-1028/PPPwnGo-v2.8-1028.zip | ![]() | 302 Found | 0 B | |||||||
HTTP Headers
| ||||||||||
objects.githubusercontent.com/github-production-release-asset-2e65be/794810266/4f736a50-67ac-4b56-9cd4-47935b6c0965?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20241101%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20241101T191501Z&X-Amz-Expires=300&X-Amz-Signature=4c816951102557040acca72fc8cf10fd346b059cb1de966a725dad870b3a5dc0&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DPPPwnGo-v2.8-1028.zip&response-content-type=application%2Foctet-stream | ![]() | 200 OK | 7.2 MB | |||||||
Detections
HTTP Headers
| ||||||||||