Report Overview

  1. Submitted URL

    raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/Covid29-Ransomware/Covid29%20Ransomware.zip

  2. IP

    185.199.108.133

    ASN

    #54113 FASTLY

  3. Submitted

    2024-04-19 08:52:17

    Access

    public

  4. Website Title

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    10

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/Covid29-Ransomware/Covid29%20Ransomware.zip

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    1.8 MB (1808965 bytes)

  2. Hash

    272d3e458250acd2ea839eb24b427ce5

    fae7194da5c969f2d8220ed9250aa1de7bf56609

  1. Archive (25)

  2. FilenameMd5File type
    TrojanRansomCovid29.exe
    9f0563f2faaf6b9a0f7b3cf058ac80b6
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    readme.txt
    f4f557db9c615c87e524802af8a9992f
    ASCII text, with CRLF line terminators
    Cov29LockScreen.exe
    f724c6da46dc54e6737db821f9b62d77
    PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
    Bat_To_Exe_Converter.exe
    76d5900a4adf4c1f2ab8dbfd0a450c4a
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    help.chm
    ffa8c49b21b077b0dc4b51a1f6f9a753
    MS Windows HtmlHelp Data
    settings.ini
    d3be6c4edea45f5a9a766dd235e4c23a
    Generic INItialization configuration [files]
    AdvancedOptions.PNG
    c5f0f9ab684461c635f551d045e6caa5
    PNG image data, 356 x 419, 8-bit/color RGBA, non-interlaced
    bg.jpg
    108fc794e7171419cf881b4058f88d20
    JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 700x393, components 3
    Chaos Ransomware Builder v4.exe
    8b855e56e41a6e10d28522a20c1e0341
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Cov29Cry.exe.death
    8bcd083e16af6c15e14520d5a0bd7e6a
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    covid29-is-here.txt
    0a9f7b91e7c6beac740c17951e7feecb
    ASCII text, with CRLF line terminators
    FileExtentions.txt
    189eeecf41700ae5ba9ae1a4a1c49e9a
    ASCII text, with very long lines (1689), with no line terminators
    Options.PNG
    cdd3a90a2f2ab81410f356dcb38fc17b
    PNG image data, 847 x 544, 8-bit/color RGBA, non-interlaced
    23311_lores.jpg
    108fc794e7171419cf881b4058f88d20
    JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 700x393, components 3
    Cov29LockScreen.exe
    f724c6da46dc54e6737db821f9b62d77
    PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
    Cov29LockScreen.vbp
    420983daadcf363dee597da26732659d
    ASCII text, with CRLF line terminators
    Cov29LockScreen.vbw
    4bc79d0f731d9f8a6a7648f3f8c7b2ed
    ASCII text, with CRLF line terminators
    Form1.frm
    7bc02ce2aa937dc58733a326b6d6df4e
    ASCII text, with CRLF line terminators
    Form1.frx
    654d48ddcf505d1b7c31817d9b8a91f2
    data
    Cov29Cry.exe.death
    8bcd083e16af6c15e14520d5a0bd7e6a
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    icon.jfif
    a09e22b372ad74b3a504798b7d3f87b0
    JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 300x168, components 3
    mbr.cpp
    d20eddecb5625b60d61d80c067537188
    C++ source, ASCII text, with CRLF line terminators
    mbr.exe.danger
    35af6068d91ba1cc6ce21b461f242f94
    PE32 executable (GUI) Intel 80386, for MS Windows, 15 sections
    TrojanRansomCovid29.bat
    57f0432c8e31d4ff4da7962db27ef4e8
    DOS batch file, ASCII text, with CRLF line terminators
    icon.ico
    c2c802b751e5a25b524b9369f583c371
    MS Windows icon resource - 1 icon, 256x-113, 32 bits/pixel

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/Covid29-Ransomware/Covid29%20Ransomware.zip
185.199.110.133 1.8 MB