Report Overview

  1. Submitted URL

    github.com/pankoza2-pl/malwaredatabase-old/raw/main/TrashDestruct.zip

  2. IP

    140.82.121.3

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-19 08:15:06

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    8

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
raw.githubusercontent.com358022014-02-062014-03-012024-04-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/TrashDestruct.zip

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    8.4 MB (8364273 bytes)

  2. Hash

    4b806168e3dbec482d080b6fa87a30c0

    af4df8404232372296080f66c3053909429c5dab

  1. Archive (16)

  2. FilenameMd5File type
    TrashDestruct.vbs
    f1b731c6fc52b72b19b492a55cd0f639
    data
    bsod.cpp
    ca73d197def1b095bc712cbec6168fe2
    C source, ASCII text, with CRLF line terminators
    Google-Noto-Emoji-Symbols-73042-biohazard.ico
    76744df4fbcd1b01a399075544391104
    MS Windows icon resource - 10 icons, 256x256 with PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 256x256 with - PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
    msg1.vbs
    bdb43bd49106db99bb4ed84b8a036ec0
    Unicode text, UTF-8 text, with very long lines (331), with CRLF line terminators
    noise.cpp
    c23255b8203fb13eb428bc83e8b58f8e
    C++ source, ASCII text, with CRLF line terminators
    noise.wav
    3ec15c7508cf92274184b82e28f6150b
    RIFF (little-endian) data, WAVE audio, Microsoft PCM, 8 bit, mono 8000 Hz
    PatBlt3.cpp
    8c63caabd47a8651c4169da457f12274
    C source, ASCII text, with CRLF line terminators
    ScreenShuffle.cpp
    dd3e41535b2443e8f9dfee47867a89d7
    C source, ASCII text, with CRLF line terminators
    MBR - Note Builder.exe
    631e45f7bd3d32363362f09cbfbdfbae
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    mbr.exe
    b3b0e390c2a3388b3d3e20f6336b9079
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
    TrashDestruct 1.0.exe
    e5532c5358b8915d86c8c8201be70762
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    license.txt
    a1924707b191714b7044c99ed4e6b57e
    ASCII text, with CRLF line terminators
    settings
    61d7de0672f36a7e989ceb053545cda7
    data
    Vbs_To_Exe.exe
    27dd3186c5f51823aaf82b815a3abfd6
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    Vbs_To_Exe_(x64).exe
    77adc429fe1e03c87a3904222f3d2de9
    PE32+ executable (GUI) x86-64, for MS Windows, 3 sections
    Vbs_To_Exe_(Installer).exe
    29299a10993e10d0798f651b0e459170
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects obfuscated wscript.shell commands
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/pankoza2-pl/malwaredatabase-old/raw/main/TrashDestruct.zip
140.82.121.3302 Found0 B
raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/main/TrashDestruct.zip
185.199.109.133200 OK8.4 MB