Report Overview

  1. Visited public
    2025-04-27 19:04:34
    Tags
  2. URL

    raw.githubusercontent.com/darted077/ZeroCheat/refs/heads/main/ZeroNet%20UD%20v2.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    185.199.109.133

    #54113 FASTLY

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012025-04-23

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/darted077/ZeroCheat/refs/heads/main/ZeroNet%20UD%20v2.exeMofongo loader maps and executes a payload in a hollowed msedge process

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/darted077/ZeroCheat/refs/heads/main/ZeroNet%20UD%20v2.exe

  2. IP

    185.199.108.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32+ executable (console) x86-64, for MS Windows, 6 sections

    Size

    3.2 MB (3153408 bytes)

  2. Hash

    6077bd699a1bf5eb418c3f0dbe13b813

    c56c4dcde22239d8e3c3229eecf4f21405b6cc39

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Mofongo loader maps and executes a payload in a hollowed msedge process
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/darted077/ZeroCheat/refs/heads/main/ZeroNet%20UD%20v2.exe
185.199.108.133200 OK3.2 MB