Report Overview
Submitted URL
raw.githubusercontent.com/steamsv/trojan/master/trojan-cli.zip
IP
185.199.110.133
ASN
#54113 FASTLY
Submitted
2024-05-08 14:28:48
Access
public
Website Title
about:privatebrowsing
Final URL
about:privatebrowsing
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
raw.githubusercontent.com | 35802 | 2014-02-06 | 2014-03-01 | 2024-05-07 | 516 B | 18 MB | 185.199.109.133 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
raw.githubusercontent.com/steamsv/trojan/master/trojan-cli.zip
IP
185.199.109.133
ASN
#54113 FASTLY
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
18 MB (18037714 bytes)
Hash
c28448119ae51e2dc1cdc2969769add3
9a6c600bba8811a041220e2f625ff3ad580ca27c
Archive (18)
Filename | Md5 | File type | |||
---|---|---|---|---|---|
CONTRIBUTORS.md | 33cdaa4f4a3f8d0e452caa80028f3833 | ASCII text, with CRLF line terminators | |||
client.json-example | 10c884193b09e0295f46eb571a70e19e | JSON text data | |||
forward.json-example | 572f849c4e64cfc3c7e5ce97fab82516 | JSON text data | |||
server.json-example | ea84738f55464fe26f32a832327dd175 | JSON text data | |||
libcrypto-1_1.dll | 198c961ed075da1d4ad33e630a89cb62
| PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections | |||
libmariadb.dll | d0f3c839fabfe39e819445ef4ca01545 | PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections | |||
libssl-1_1.dll | 69d1206050cd471475d5f94d150820d2 | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections | |||
LICENSE | f769d71505757a1c5eed7d426ccd1c94 | ASCII text, with CRLF line terminators | |||
msvcp140.dll | ba72c2f6f465926980adc2fb7f8b3490 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 7 sections | |||
msvcp140_1.dll | 18a6c1a3d630dfcbc227082d5b06681a | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | |||
msvcp140_2.dll | a7f495ec0db18ba5340d380341ae80e9 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | |||
README.md | ae8da0f9579eec3edbc202fb2894068e | ASCII text, with CRLF line terminators | |||
start.bat | 28a76ea0807ab465e50759dfb8f047a6 | DOS batch file, ASCII text, with CRLF line terminators | |||
stop.bat | 33dec65b25bc372516cef00eafa54f39 | DOS batch file, ASCII text, with CRLF line terminators | |||
trojan.exe | e6c14e3ae23e01a047af328ca91282a0
| PE32+ executable (console) x86-64, for MS Windows, 6 sections | |||
vcruntime140.dll | 0c583614eb8ffb4c8c2d9e9880220f1d | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | |||
vcruntime140_1.dll | 770184b0a38debfa6194f71d7673ea2a | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | |||
VC_redist.x64.exe | be433764fa9bbe0f2f9c654f6512c9e0 | PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | meth_get_eip |
VirusTotal | malicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
raw.githubusercontent.com/steamsv/trojan/master/trojan-cli.zip | 185.199.109.133 | 200 OK | 18 MB | |||||||
Detections
HTTP Headers
| ||||||||||