Report Overview

  1. Submitted URL

    raw.githubusercontent.com/jibadea/loggs/main/1.exe.exe

  2. IP

    185.199.108.133

    ASN

    #54113 FASTLY

  3. Submitted

    2024-04-16 14:53:56

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/jibadea/loggs/main/1.exe.exedetect_Redline_Stealer_V2
mediumraw.githubusercontent.com/jibadea/loggs/main/1.exe.exeWindows.Trojan.RedLineStealer
mediumraw.githubusercontent.com/jibadea/loggs/main/1.exe.exeWindows.Trojan.RedLineStealer

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/jibadea/loggs/main/1.exe.exe

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    179 kB (179200 bytes)

  2. Hash

    6f6e711be63b4961a8a3688b4aa83f5a

    45e3d3ae272733d7e3f364a3f37729c88e719d04

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    detect_Redline_Stealer_V2
    Elastic Security YARA Rulesmalware
    Windows.Trojan.RedLineStealer
    Elastic Security YARA Rulesmalware
    Windows.Trojan.RedLineStealer
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/jibadea/loggs/main/1.exe.exe
185.199.109.133200 OK179 kB