Report Overview

  1. Visited public
    2025-02-25 20:27:36
    Tags
  2. URL

    envs.sh/Faf.exe/https:/envs.sh/eeq.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    89.163.145.170

    #24961 WIIT AG

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
8

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
envs.shunknown2019-08-032019-08-032025-02-21

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumenvs.sh/Faf.exe/https:/envs.sh/eeq.exeDetects XWorm RAT
mediumenvs.sh/Faf.exe/https:/envs.sh/eeq.exeDetect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
mediumenvs.sh/Faf.exe/https:/envs.sh/eeq.exeEXE_RAT_XWorm_April2024

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    envs.sh/Faf.exe/https:/envs.sh/eeq.exe

  2. IP

    89.163.145.170

  3. ASN

    #24961 WIIT AG

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    82 kB (82432 bytes)

  2. Hash

    11fc073e329d4e257ef6c409cc225d0e

    4a04710d0deca882867207e87cf9fb8267b544c5

    Detections

    AnalyzerVerdictAlert
    RussianPanda public YARA rulesmalware
    Detects XWorm RAT
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    YARAhub by abuse.chmalware
    EXE_RAT_XWorm_April2024
    VirusTotalmalicious
    ClamAVmalicious
    Win.Packed.njRAT-10002074-1

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
envs.sh/Faf.exe/https:/envs.sh/eeq.exe
89.163.145.170200 OK82 kB