Report Overview

  1. Submitted URL

    github.com/ItsAina/HwChanger/archive/refs/heads/main.zip

  2. IP

    140.82.121.4

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-24 18:38:39

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    9

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
codeload.github.com623592007-10-092013-04-182024-04-24

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/ItsAina/HwChanger/zip/refs/heads/main

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    1.9 MB (1867579 bytes)

  2. Hash

    e4634b29a508782904bd9a6e48c67161

    73305fbf01a746e6ecc055f0bb621bc897e3002a

  1. Archive (12)

  2. FilenameMd5File type
    AMIDEWIN.EXE
    182ec3a59bd847fb1bc3e12a41d48fa6
    PE32 executable (console) Intel 80386, for MS Windows, 3 sections
    AMIDEWINx64.EXE
    6a6505b2413d2c7b16c6d059448db9e5
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    DMI16.EXE
    2a89d4e479351022ab8bd604030a76f3
    MS-DOS executable, NE for MS Windows 3.x (3.10) (EXE)
    DMIEDIT.EXE
    fbaf6262fd84f9966338518d4de46fdd
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    README.txt
    0e28e605e0988892043002e8d6fa719b
    ASCII text, with CRLF line terminators
    Readmetest.txt
    bdc1c902b4b5d373488db0578db9aae2
    ASCII text, with CRLF line terminators
    UCOREDLL.DLL
    8370f3114924ed6c53741de7a253625a
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 4 sections
    UCORESYS.SYS
    9555d36fb21b993e5c4b98c2fc2b3671
    PE32 executable (native) Intel 80386, for MS Windows, 4 sections
    UCOREVXD.VXD
    211b3cda6ee0f7a8c86ffc2e5177020d
    MS-DOS executable, LE executable for MS Windows (VxD)
    UCOREW64.SYS
    a17c58c0582ee560c72f60764ed63224
    PE32+ executable (native) x86-64, for MS Windows, 3 sections
    Volumeid.exe
    4d867033b27c8a603de4885b449c4923
    PE32 executable (console) Intel 80386, for MS Windows, 5 sections
    amifldrv64.sys
    785045f8b25cd2e937ddc6b09debe01a
    PE32+ executable (native) x86-64, for MS Windows, 5 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    Elastic Security YARA Rulesmalware
    Windows.VulnDriver.Amifldrv
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/ItsAina/HwChanger/archive/refs/heads/main.zip
140.82.121.4302 Found0 B
codeload.github.com/ItsAina/HwChanger/zip/refs/heads/main
140.82.121.9200 OK1.9 MB