Report Overview

  1. Submitted URL

    github.com/AnonAm39/antivirus-bypass/raw/main/Discord.exe

  2. IP

    140.82.121.4

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-26 12:43:02

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
raw.githubusercontent.com358022014-02-062014-03-012024-04-25

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/AnonAm39/antivirus-bypass/main/Discord.exeDetects QuasarRAT malware
mediumraw.githubusercontent.com/AnonAm39/antivirus-bypass/main/Discord.exeIdentify QuasarRAT samples

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/AnonAm39/antivirus-bypass/main/Discord.exe

  2. IP

    185.199.111.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    3.6 MB (3551232 bytes)

  2. Hash

    aa1b304a2dc98560709eed1af8afecbb

    823d153a5e0223a08e826d6e8b4811f0bd83c707

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects QuasarRAT malware
    YARAhub by abuse.chmalware
    Identify QuasarRAT samples
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/AnonAm39/antivirus-bypass/raw/main/Discord.exe
140.82.121.4302 Found0 B
raw.githubusercontent.com/AnonAm39/antivirus-bypass/main/Discord.exe
185.199.111.133200 OK3.6 MB