Report Overview
Submitted URL
github.com/pankoza2-pl/malwaredatabase-old/raw/main/Covid29-Ransomware/Covid29%20Ransomware.zip
IP
140.82.121.4
ASN
#36459 GITHUB
Submitted
2024-04-19 08:52:25
Access
public
Website Title
Final URL
about:privatebrowsing
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
10
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
github.com | 1423 | 2007-10-09 | 2016-07-13 | 2024-03-24 | 549 B | 3.5 kB | 140.82.121.3 |
raw.githubusercontent.com | 35802 | 2014-02-06 | 2014-03-01 | 2024-04-18 | 560 B | 1.8 MB | 185.199.108.133 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/Covid29-Ransomware/Covid29%20Ransomware.zip
IP
185.199.108.133
ASN
#54113 FASTLY
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
1.8 MB (1808965 bytes)
Hash
272d3e458250acd2ea839eb24b427ce5
fae7194da5c969f2d8220ed9250aa1de7bf56609
Archive (25)
Filename | Md5 | File type | |||
---|---|---|---|---|---|
TrojanRansomCovid29.exe | 9f0563f2faaf6b9a0f7b3cf058ac80b6
| PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections | |||
readme.txt | f4f557db9c615c87e524802af8a9992f | ASCII text, with CRLF line terminators | |||
Cov29LockScreen.exe | f724c6da46dc54e6737db821f9b62d77
| PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections | |||
Bat_To_Exe_Converter.exe | 76d5900a4adf4c1f2ab8dbfd0a450c4a
| PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections | |||
help.chm | ffa8c49b21b077b0dc4b51a1f6f9a753 | MS Windows HtmlHelp Data | |||
settings.ini | d3be6c4edea45f5a9a766dd235e4c23a | Generic INItialization configuration [files] | |||
AdvancedOptions.PNG | c5f0f9ab684461c635f551d045e6caa5 | PNG image data, 356 x 419, 8-bit/color RGBA, non-interlaced | |||
bg.jpg | 108fc794e7171419cf881b4058f88d20 | JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 700x393, components 3 | |||
Chaos Ransomware Builder v4.exe | 8b855e56e41a6e10d28522a20c1e0341
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | |||
Cov29Cry.exe.death | 8bcd083e16af6c15e14520d5a0bd7e6a
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | |||
covid29-is-here.txt | 0a9f7b91e7c6beac740c17951e7feecb | ASCII text, with CRLF line terminators | |||
FileExtentions.txt | 189eeecf41700ae5ba9ae1a4a1c49e9a | ASCII text, with very long lines (1689), with no line terminators | |||
Options.PNG | cdd3a90a2f2ab81410f356dcb38fc17b | PNG image data, 847 x 544, 8-bit/color RGBA, non-interlaced | |||
23311_lores.jpg | 108fc794e7171419cf881b4058f88d20 | JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 700x393, components 3 | |||
Cov29LockScreen.exe | f724c6da46dc54e6737db821f9b62d77
| PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections | |||
Cov29LockScreen.vbp | 420983daadcf363dee597da26732659d | ASCII text, with CRLF line terminators | |||
Cov29LockScreen.vbw | 4bc79d0f731d9f8a6a7648f3f8c7b2ed | ASCII text, with CRLF line terminators | |||
Form1.frm | 7bc02ce2aa937dc58733a326b6d6df4e | ASCII text, with CRLF line terminators | |||
Form1.frx | 654d48ddcf505d1b7c31817d9b8a91f2 | data | |||
Cov29Cry.exe.death | 8bcd083e16af6c15e14520d5a0bd7e6a
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | |||
icon.jfif | a09e22b372ad74b3a504798b7d3f87b0 | JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 300x168, components 3 | |||
mbr.cpp | d20eddecb5625b60d61d80c067537188 | C++ source, ASCII text, with CRLF line terminators | |||
mbr.exe.danger | 35af6068d91ba1cc6ce21b461f242f94
| PE32 executable (GUI) Intel 80386, for MS Windows, 15 sections | |||
TrojanRansomCovid29.bat | 57f0432c8e31d4ff4da7962db27ef4e8
| DOS batch file, ASCII text, with CRLF line terminators | |||
icon.ico | c2c802b751e5a25b524b9369f583c371 | MS Windows icon resource - 1 icon, 256x-113, 32 bits/pixel |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (2)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
github.com/pankoza2-pl/malwaredatabase-old/raw/main/Covid29-Ransomware/Covid29%20Ransomware.zip | 140.82.121.3 | 0 B | ||||||||
HTTP Headers
| ||||||||||
raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/Covid29-Ransomware/Covid29%20Ransomware.zip | 185.199.108.133 | 1.8 MB | ||||||||
Detections
HTTP Headers
| ||||||||||