Report Overview

  1. Visited public
    2024-10-25 09:11:58
    Tags
  2. URL

    github.com/AikenOZ/fixdiscord/archive/refs/tags/1.2.0.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
13

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-10-23
codeload.github.com623592007-10-092013-04-182024-10-23

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/AikenOZ/fixdiscord/zip/refs/tags/1.2.0

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    2.3 MB (2281772 bytes)

  2. Hash

    ca478ccd04648727b7e5be80151b38f4

    71ec792a520dcaf5a2030190acd2d26393939773

  1. Archive (41)

  2. FilenameMd5File type
    README.md
    c6ed550751a06b02da4b4f1d3e4b09e1
    Unicode text, UTF-8 text, with very long lines (387)
    0_russia_update_blacklist_file.cmd
    a6af4b081a4cbcd448759306b2366eac
    DOS batch file, ASCII text
    1_russia_blacklist.cmd
    76763259e528cd27e998fb4c665c2b78
    DOS batch file, ASCII text
    1_russia_blacklist_YOUTUBE.cmd
    55e68f566514148bcf844524b4e99041
    DOS batch file, ASCII text
    1_russia_blacklist_YOUTUBE_ALT.cmd
    74a8e80f39adfd1ff8836a5c05254f37
    DOS batch file, ASCII text
    1_russia_blacklist_dnsredir.cmd
    06018c5958cddd1d0cf3135762aeb2eb
    DOS batch file, ASCII text
    2_any_country.cmd
    72103c58f2ed536ebc07e19fd00fa2f0
    DOS batch file, ASCII text
    2_any_country_dnsredir.cmd
    77048213eb9358ff71f99667dd08034b
    DOS batch file, ASCII text
    Readme.txt
    5b856d8c72f27dc37a0b78311acebb86
    Unicode text, UTF-8 text, with no line terminators
    LICENSE-getline.txt
    3a7edebc3612bcea2306f73b92342a44
    ASCII text, with CRLF line terminators
    LICENSE-goodbyedpi.txt
    c4082b6c254c9fb71136710391d9728b
    ASCII text, with CRLF line terminators
    LICENSE-uthash.txt
    5cc1f1e4c71f19f580458586756c02b4
    ASCII text
    LICENSE-windivert.txt
    b864fbb188a7c3a11cef80f3ee902d77
    ASCII text, with CRLF line terminators
    russia-blacklist.txt
    40b6bf73581b87cca8dad29b2ae82a95
    ASCII text
    russia-youtube.txt
    91d74100607dba77eda0d7a75dacb0cc
    ASCII text
    service_install_russia_blacklist.cmd
    af6dac6686b77dc51203800737f41b75
    DOS batch file, ASCII text
    service_install_russia_blacklist_YOUTUBE.cmd
    ab8e1d24adbba8444d9a1970b594f18f
    DOS batch file, ASCII text, with very long lines (310)
    service_install_russia_blacklist_YOUTUBE_ALT.cmd
    e9b8f24c9624866d1607c05b6a79a6ec
    DOS batch file, ASCII text, with very long lines (317)
    service_install_russia_blacklist_dnsredir.cmd
    77b1d63472e67c4368961c463cc1d92c
    DOS batch file, ASCII text
    service_remove.cmd
    204b35d000d6b29c1102b1d8b6a63dc7
    DOS batch file, ASCII text
    WinDivert.dll
    1cb0efd60883b5637b31bf46c34ae199
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
    WinDivert32.sys
    cd477ee96ff05cacda8ac3c0e9316d7a
    PE32 executable (native) Intel 80386, for MS Windows, 6 sections
    WinDivert64.sys
    6a33620de63bccaf5e5314ee49cd58fb
    PE32+ executable (native) x86-64, for MS Windows, 8 sections
    goodbyedpi.exe
    9c3f16d5a0aff180f9d04ae6c0fe1f28
    PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, 11 sections
    WinDivert.dll
    88e1c19b978436258f7c938013408a8a
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections
    WinDivert64.sys
    6a33620de63bccaf5e5314ee49cd58fb
    PE32+ executable (native) x86-64, for MS Windows, 8 sections
    goodbyedpi.exe
    afa7f66231b9cec7237e738b622c0181
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 12 sections
    WinDivert.dll
    b2014d33ee645112d5dc16fe9d9fcbff
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections
    WinDivert64.sys
    89ed5be7ea83c01d0de33d3519944aa5
    PE32+ executable (native) x86-64, for MS Windows, 8 sections
    cygwin1.dll
    c50b50303fae4afe7248307339a00d13
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 3 sections
    quic_initial_www_google_com.bin
    312526d39958d89b1f8ab67789ab985f
    data
    tls_clienthello_www_google_com.bin
    7ab7ad857c5b8794fbdf1091b494dc94
    data
    winws.exe
    8c624e64742bc19447d52f61edec52db
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 10 sections
    discord.bat
    45690b45382641fbf75f75cbbb259817
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    discord_youtube.bat
    a86ee199df14377cc62001fe47ce9ec3
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    list-discord.txt
    6b11a60838a26a7b78f366036ac5e945
    ASCII text, with CRLF line terminators
    list-general.txt
    973ce9fd99ce984a7c4ed77d41acaf3b
    ASCII text, with CRLF line terminators
    service_discord.bat
    8aca9a7fa70ca4fbf815467209bfad44
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    service_discord_youtube.bat
    38f2b9d9d51139686889f47583c40117
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    service_goodbye_discord.bat
    50dd66c2196f7d8518140c3eb2b204eb
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    service_remove.bat
    c29e97503aaba5159ca877814a464451
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects WinDivert User-Mode packet capturing driver
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks
    Public Nextron YARA rulesmalware
    Detects WinDivert User-Mode packet capturing driver
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks
    Public Nextron YARA rulesmalware
    Detects WinDivert User-Mode packet capturing driver
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/AikenOZ/fixdiscord/archive/refs/tags/1.2.0.zip
140.82.121.3302 Found0 B
codeload.github.com/AikenOZ/fixdiscord/zip/refs/tags/1.2.0
140.82.121.9200 OK2.3 MB