Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
danzogit.github.io | unknown | 2013-03-08 | 2025-04-26 | 2025-05-08 | 510 B | 2.1 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
danzogit.github.io/dy/zapret-all-1.7.1.zip
IP
185.199.110.153
ASN
#54113 FASTLY
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
2.1 MB (2107784 bytes)
Hash
31b112a234885b3b38c71dd60fcb21bb
501c724116977a7f0a0b4a142b1c9980f5e5cdb1
Archive (30)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
1_general1.bat | 4017d302aa185eafa6a91f1967cd6c1f | DOS batch file, ASCII text | ||||||
2_general2.bat | fe398c1dc9577092907090a2a511a468 | DOS batch file, ASCII text | ||||||
cygwin1.dll | a1c82ed072dc079dd7851f82d9aa7678 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 14 sections | ||||||
quic_initial_www_google_com.bin | 312526d39958d89b1f8ab67789ab985f | data | ||||||
tls_clienthello_www_google_com.bin | 7ab7ad857c5b8794fbdf1091b494dc94 | data | ||||||
tls_earth_google_com.bin | 6b7843ae5fce01fde6d5520c5f44082e | data | ||||||
WinDivert.dll | b2014d33ee645112d5dc16fe9d9fcbff
| PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections | ||||||
WinDivert64.sys | 89ed5be7ea83c01d0de33d3519944aa5
| PE32+ executable (native) x86-64, for MS Windows, 8 sections | ||||||
winws.exe | 4d3bf0f712d48e14d4d3de7c717dc856 | PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 10 sections | ||||||
cloudflare_switch.bat | b5e7bfbc31f4687d40428102bf3b2b6e | DOS batch file, ASCII text | ||||||
general (ALT).bat | b51d6ee8e29c9633d5bb43c19217cbd7 | DOS batch file, ASCII text | ||||||
general (ALT2).bat | 54f0b216c41149934f30ee044db5d43f | DOS batch file, ASCII text | ||||||
general (ALT3).bat | 995ca449aae1a2836270f637f3187952 | DOS batch file, ASCII text | ||||||
general (ALT4).bat | 80cf2fea13f4f7b20da00a860c2362f6 | DOS batch file, ASCII text | ||||||
general (ALT5).bat | 2b0a8e417b2426e219b3e3df9bebbb54 | DOS batch file, ASCII text | ||||||
general (FAKE TLS MOD ALT).bat | 1222f3cce28e6fe903399a2aefd56e12 | DOS batch file, ASCII text | ||||||
general (FAKE TLS MOD AUTO).bat | 65b5ac0439a336518c29ed4337ba888c | DOS batch file, ASCII text | ||||||
general (FAKE TLS MOD).bat | d3f7f517de86f88157b1f971d90f7e29 | DOS batch file, ASCII text | ||||||
general (����).bat | 47a2c4b233cea215ea211cd989393441 | DOS batch file, ASCII text | ||||||
general (����2).bat | 1125f0ec1698a151669471daac754f13 | DOS batch file, ASCII text | ||||||
ipset-cloudflare.txt | 3c49a0e8b9ba6b97af6e08c15b8b877b | ASCII text, with CRLF line terminators | ||||||
list-general.txt | 37914ad379c003a37d5f7f22c2d6148d | ASCII text, with CRLF line terminators | ||||||
old_general.bat | 34c3721da77f12eebbf826c92eefa641 | DOS batch file, ASCII text, with CRLF line terminators | ||||||
old_general2.bat | 772dd5d369afc6e227a1af4eea7d9901 | DOS batch file, ASCII text, with CRLF line terminators | ||||||
old_general3.bat | 8f221c9083de34eae48b2950fa7dc3b3 | DOS batch file, ASCII text, with CRLF line terminators | ||||||
old_general4.bat | a48c74eb2a588018d6f654eb01636eec | DOS batch file, ASCII text, with CRLF line terminators | ||||||
old_general5.bat | a61579b285ab5ab2c030a3051fef3025 | DOS batch file, ASCII text, with CRLF line terminators | ||||||
service_install.bat | c7869e9d093d0b9bce58634f9bef47a2 | DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators | ||||||
service_remove.bat | a693a3b4f43fcb3e9768f4f220bcbb37 | DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators | ||||||
service_status.bat | 629e439096846c15e1bf856966e1af0b | DOS batch file, ASCII text |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public Nextron YARA rules | malware | Detects WinDivert User-Mode packet capturing driver |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
danzogit.github.io/dy/zapret-all-1.7.1.zip | ![]() | 200 OK | 2.1 MB | |||||||
Detections
HTTP Headers
| ||||||||||