Report Overview

  1. Visited public
    2024-07-24 05:12:21
    Tags
  2. URL

    github.com/QuakedK/Downloads/raw/main/OneclickTools.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
r10.o.lencr.orgunknown2020-06-292024-06-06 21:45:112024-07-23 18:12:04
github.com14232007-10-092016-07-13 12:28:222024-07-22 19:13:57
raw.githubusercontent.com358022014-02-062014-03-01 08:08:082024-07-23 19:58:08

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/QuakedK/Downloads/main/OneclickTools.zip

  2. IP

    185.199.109.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    578 kB (577640 bytes)

  2. Hash

    d2be90c23063c07c5bf6e02c9400ac35

    c2ca99de035c17ba9b7912c26725efffe290b1db

  1. Archive (5)

  2. FilenameMd5File type
    AMD Bloat.bat
    4f432879f0b02c48301741a208cd1309
    DOS batch file, ASCII text, with CRLF line terminators
    dControl.exe
    58008524a6473bdf86c1040a9a9e39c3
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    NSudoLG.exe
    423129ddb24fb923f35b2dd5787b13dd
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    Orca.bat
    3f9804cf3854d5c1e336870a487cb8c7
    DOS batch file, ASCII text, with CRLF line terminators
    SetTimerResolution.exe
    29446c868a831614e6304dbc4159fa41
    PE32+ executable (console) x86-64, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects malware by known bad imphash or rich_pe_header_hash
    Public InfoSec YARA rulesmalware
    Identifies Defender Control, used by attackers to disable Windows Defender.
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (7)

URLIPResponseSize
r10.o.lencr.org/
23.36.76.226 504 B
github.com/QuakedK/Downloads/raw/main/OneclickTools.zip
140.82.121.4302 Found0 B
raw.githubusercontent.com/QuakedK/Downloads/main/OneclickTools.zip
185.199.109.133200 OK578 kB
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B
r10.o.lencr.org/
23.36.77.32 504 B