Report Overview

  1. Submitted URL

    github.com/S3cur3Th1sSh1t/Creds/raw/master/pwned_x64/notepad.exe

  2. IP

    140.82.121.3

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-17 10:17:28

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
raw.githubusercontent.com358022014-02-062014-03-012024-04-17

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/pwned_x64/notepad.exeDetects c# red/black-team tools via typelibguid
mediumraw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/pwned_x64/notepad.exeDetects .NET red/black-team tools via name
mediumraw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/pwned_x64/notepad.exep0wnedShell Runspace Post Exploitation Toolkit - file p0wnedListenerConsole.cs

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/pwned_x64/notepad.exe

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows, 2 sections

    Size

    7.0 MB (7006208 bytes)

  2. Hash

    2c8c879c20f91e59743b0df61983a1e6

    826f7621289fa607ca24465276e2f5a4b4d950e5

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects c# red/black-team tools via typelibguid
    Public Nextron YARA rulesmalware
    Detects .NET red/black-team tools via name
    Public Nextron YARA rulesmalware
    p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedListenerConsole.cs
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/S3cur3Th1sSh1t/Creds/raw/master/pwned_x64/notepad.exe
140.82.121.3302 Found0 B
raw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/pwned_x64/notepad.exe
185.199.110.133200 OK7.0 MB