Report Overview

  1. Submitted URL

    raw.githubusercontent.com/georgjf/SMTPtool/master/bin/SMTPtool_v4/SMTPtestTool_v4.zip

  2. IP

    185.199.108.133

    ASN

    #54113 FASTLY

  3. Submitted

    2024-04-26 08:24:30

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-04-24

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/georgjf/SMTPtool/master/bin/SMTPtool_v4/SMTPtestTool_v4.zip

  2. IP

    185.199.111.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    322 kB (321953 bytes)

  2. Hash

    0752184e75731b991fbc62e17e6f8834

    e36094ce88dd3d82f82f8f5d6a5e0fe474c86733

  1. Archive (10)

  2. FilenameMd5File type
    config.xml
    7f92f7f670b4231d5d3356c40476ba4d
    XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
    Ionic.Zlib.dll
    fd42dec3ab2e491aa54e6ee66ef63a5c
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Active Content - Excel Macro.eml
    9a8831fdb3628ec3c6ab888ade9e861e
    MIME entity, ASCII text, with CRLF line terminators
    Active Content - HTML JavaScript.eml
    7fcc3986fb54654b71f396ce51ae6f01
    MIME entity, ASCII text, with CRLF line terminators
    Active Content - PDF.eml
    4e1eaf5a71cfcafefa2dfd65b1400c4d
    MIME entity, ASCII text, with CRLF line terminators
    EICAR Test.eml
    511a76350ee22e98f642cde4ad437a2a
    MIME entity, ASCII text, with CRLF line terminators
    Encrypted Zip.eml
    25ad5e5606d86b14057378a7a811b7fa
    MIME entity, ASCII text, with CRLF line terminators
    Exe file.eml
    88b0578428d9fecc4c887d7033be4557
    MIME entity, ASCII text, with CRLF line terminators
    Junk Detection v4.eml
    44658fd64245d05776624f0de949ce73
    MIME entity, ASCII text, with CRLF line terminators
    SMTPtestTool.exe
    e1654ca9b8ded5b4c3f3fd2741918717
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/georgjf/SMTPtool/master/bin/SMTPtool_v4/SMTPtestTool_v4.zip
185.199.111.133200 OK322 kB