Report Overview

  1. Submitted URL

    github.com/0xrose/Rose-Stealer_old/archive/refs/heads/main.zip

  2. IP

    140.82.121.3

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-16 06:40:27

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
codeload.github.com623592007-10-092013-04-182024-04-15

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/0xRose/Rose-Stealer_old/zip/refs/heads/main

  2. IP

    140.82.121.10

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    954 kB (953906 bytes)

  2. Hash

    2c22a33f0994faa508952bfe8332a75b

    a1b7e7a8540ee667eb72497b28bc52a382a3bd4f

  1. Archive (73)

  2. FilenameMd5File type
    .bandit
    80eaaa0e0619f6ef5ffc5840ab366bfd
    ASCII text
    .deepsource.toml
    d54de45ac7659ba5742e5768485f3fb4
    ASCII text
    bug_report.md
    e468801d29e6b66b0d496136e22e8b34
    ASCII text
    feature_request.md
    174545e1d9daff8020525fdd1e020411
    ASCII text
    .gitignore
    83a915b86b03f694b477f01afb8b957e
    ASCII text
    LICENSE
    4fb7cc4b89dc59f91c7d74135834da7f
    ASCII text
    README.md
    597769618a12a79267a23bdba8f3e1c5
    HTML document, Unicode text, UTF-8 text, with very long lines (660)
    build.bat
    aa7d5bca3642e65ce8e0c02129d67c5d
    DOS batch file, ASCII text, with CRLF line terminators
    CHANGELOG.md
    959d6fd8b7b5588f6a064f854e53f12d
    ASCII text, with CRLF line terminators
    FEATURES.md
    a5e724ad9a2c53081fc212d2f0ba7ebf
    ASCII text, with CRLF line terminators
    KNIGHT.md
    b94da643dc4485b01a30e81287dba53d
    Unicode text, UTF-8 text, with very long lines (693), with CRLF line terminators
    builder.png
    a7c40415449e963531126f54359252f2
    PNG image data, 581 x 649, 8-bit/color RGBA, non-interlaced
    rose.png
    851ad7c781acdfa0f456a2b5c4cfdc68
    PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
    roseloadingscreen.mp4
    fb68ba719b7b799b894835ea8286ddc3
    ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
    injection.js
    acdb74b377c7e2aa6c73ed9bf4f91883
    JavaScript source, Unicode text, UTF-8 text, with very long lines (548), with CRLF line terminators
    obf-injection.js
    ec79b72c09f42e1abf4d7b1ed3a13771
    JavaScript source, ASCII text, with very long lines (65536), with no line terminators
    requirements.txt
    40be6ed0d874708c9b6b70db4f359a62
    ASCII text, with CRLF line terminators
    xmri.py
    8fe2be92495269869d37a3f7f521752a
    Python script, ASCII text executable, with very long lines (427), with CRLF line terminators
    InjectX.py
    19bb7d7c8e398c0d571cfa17ddfbd3b4
    Python script, ASCII text executable, with CRLF line terminators
    _file.py
    4d9d751babed4fcdf288d0d473e971a2
    Python script, ASCII text executable, with CRLF line terminators
    _random_string.py
    5fe67271287081b44d90723cd2b3dd56
    ASCII text, with CRLF line terminators
    _roblox.py
    a93f227f9518144f658d5e76d995f245
    Python script, ASCII text executable, with very long lines (650), with CRLF line terminators
    _startup.py
    1a64ecda9c4ea92db9c057922f0e6a2a
    Python script, ASCII text executable, with CRLF line terminators
    _webhook.py
    45e33449ea34c2c1e20c04296d3a2459
    Python script, ASCII text executable, with CRLF line terminators
    antivm.py
    6bd8888ec26fac2f985bb449d547eead
    ASCII text, with CRLF line terminators
    block_sites.py
    1ed5f3e539071d31d16e48bf7044c053
    ASCII text, with very long lines (487), with CRLF line terminators
    browser.py
    47ed7f11f4d46f05abf290e5aab2250a
    Python script, Unicode text, UTF-8 text executable, with very long lines (304), with CRLF line terminators
    config.py
    d3aa91d802d835fdf48788ef51c48865
    Python script, ASCII text executable, with CRLF line terminators
    discordc.py
    9d4e1361bb8532aef6d8191d07ddb5a5
    Python script, ASCII text executable, with CRLF line terminators
    games.py
    3cbd2a3798299ca82ec0d6720d08d04a
    Python script, ASCII text executable, with CRLF line terminators
    ipinf.py
    4b49afaf8f932f59ec5480cc9af7057d
    Python script, ASCII text executable, with CRLF line terminators
    knight_rat.py
    08544e5480f1f4f25c7e3f0833e7567a
    Python script, Unicode text, UTF-8 text executable, with CRLF line terminators
    main.py
    ff2d0f75798837bc34533e03df988d3a
    Python script, ASCII text executable, with CRLF line terminators
    ransomware.py
    a3c59d21028dde3060c49310f8aa3e7e
    Python script, ASCII text executable, with very long lines (877), with CRLF line terminators
    rose_rat.py
    3d66135525220519d2881a631b06f012
    Python script, Unicode text, UTF-8 text executable, with CRLF line terminators
    sysinf.py
    53e80dc351c7ffb621b00785639d739b
    Python script, ASCII text executable, with CRLF line terminators
    tbsod.py
    f59d458d650584daae3ba78eae9cb4af
    Python script, ASCII text executable, with CRLF line terminators
    uac_bypass.py
    4c19f7bc8205ae3281651db74df4d94c
    ASCII text, with CRLF line terminators
    webhook.py
    c580594274cdda72e81d280d9161132f
    Python script, ASCII text executable, with CRLF line terminators
    xmr_miner.py
    240ea3d0269031162ecee1691cb41799
    Python script, ASCII text executable, with CRLF line terminators
    rose.py
    e83cdedb4bd88d8f49fa1a669ddee229
    Python script, Unicode text, UTF-8 text executable, with very long lines (878)
    builder.py
    414223fa930a138a46fb4e7360f0c101
    Python script, ASCII text executable, with very long lines (977), with CRLF line terminators
    msg.txt
    1e67ed971573e9221877ffc0bcd4f302
    ASCII text, with CRLF line terminators
    cert
    b769e370f66299bca7f86932bc24925f
    data
    post.py
    2b821c97e953a5996ca271486abb7df8
    Python script, ASCII text executable, with CRLF line terminators
    sigthief.py
    57156b83bcfa0c8cbc0fc36aa02a1617
    Python script, ASCII text executable
    blankobf.py
    cba22493848b4019aba07d7ae9eaf797
    Python script, ASCII text executable, with very long lines (351)
    obf.py
    89722f3c6bbc00edbcc4d4a95cdbaf95
    Python script, ASCII text executable, with CRLF line terminators
    LICENSE
    4ae09d45eac4aa08d013b5f2e01c67f6
    ASCII text
    README.md
    b1a23eb865c488cdcd3d12c5b56152d6
    ASCII text, with very long lines (5551), with CRLF line terminators
    __init__.py
    d41d8cd98f00b204e9800998ecf8427e
    main.py
    459dabda4ae7d59e2b3e669f954a3d9a
    Python script, ASCII text executable
    requirements.txt
    05709cfbb873e0a0f78200f6fd97b740
    ASCII text, with no line terminators
    setup.py
    85cc7751134b8db7876126ae5f53a393
    Python script, ASCII text executable, with CRLF line terminators
    in.py
    a3e222dd7d893c76795599a2ad6481a2
    ASCII text, with CRLF line terminators
    out.py
    235f90f9a5c310e9cf88be34e599674d
    ASCII text, with very long lines (22052), with CRLF line terminators
    rose_builder.pyw
    1b4834144ef4c17fe2f6e84553482a8c
    Python script, ASCII text executable, with very long lines (874), with CRLF line terminators
    README.md
    235ff02635228bff362958c37e45f2d7
    ASCII text, with no line terminators
    decrequirements.txt
    d4e80f4ec08e965d2a15418d630b5ec9
    ASCII text, with CRLF line terminators
    decrypter.bat
    6e1e3622edd2ef18148e9e6ffb24a4d9
    DOS batch file, ASCII text, with CRLF line terminators
    rose-decrypter.py
    7056873acc60b970f0e08fd1eb9788cc
    Python script, Unicode text, UTF-8 text executable, with CRLF line terminators
    unblock_sites.py
    5b895cf1fbf83492c851f9ed51761e20
    ASCII text, with very long lines (482), with CRLF line terminators
    COPYING
    ffa10f40b98be2c2bc9608f56827ed23
    ASCII text, with CRLF line terminators
    LICENSE
    65278e1fbeb33a2cf4bbbe2b675eb724
    PGP signed message
    NEWS
    3e223860fc132df57bfbbeb2f2569c24
    Unicode text, UTF-8 text, with CRLF line terminators
    README
    ce86e2393bd62f6e24ed8545c6c58d6c
    ASCII text, with CRLF line terminators
    THANKS.txt
    16438bcb4ff85fcc96ea0552a844d1cf
    ASCII text, with CRLF line terminators
    upx-doc.html
    478359884f5cd4a977f7d48f34317d1d
    XML 1.0 document, ASCII text, with very long lines (542), with CRLF line terminators
    upx-doc.txt
    ea38ac818a6b24362dccbf5a78c4f242
    ASCII text, with CRLF line terminators
    upx.1
    101f7462d780148577caabb639778e02
    troff or preprocessor input, ASCII text, with CRLF line terminators
    upx.exe
    655a20ead9bec35f9fea0c8bf4c8a560
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 3 sections
    setup.cfg
    f7714d2b02f861a5d8a5079d4970cadc
    ASCII text
    tox.ini
    f7714d2b02f861a5d8a5079d4970cadc
    ASCII text

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Public Nextron YARA rulesmalware
    Detects helper script used in a crypto miner campaign
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/0xrose/Rose-Stealer_old/archive/refs/heads/main.zip
140.82.121.3302 Found0 B
codeload.github.com/0xRose/Rose-Stealer_old/zip/refs/heads/main
140.82.121.10200 OK954 kB