Report Overview
Visitedpublic
2024-04-30 00:05:00
Tags
Submit Tags
URL
media.blackhat.com/us-13/US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-Fast-Track-Funded-Effort-Code.zip
Finishing URL
about:privatebrowsing
IP / ASN
104.17.177.133
#13335 CLOUDFLARENET
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
media.blackhat.com
unknown1997-05-312012-07-09 00:17:242024-02-15 02:31:45

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
media.blackhat.com/us-13/US-13-Raber-Virtual-Deobfuscator-A-DARPA-Cyber-Fast-Track-Funded-Effort-Code.zip
IP / ASN
104.17.179.133
#13335 CLOUDFLARENET
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=store
Size164 kB (164536 bytes)
MD5ee24f847006c1493ed95c0801ed5a901
SHA1a3b5556293b675af4d8721af23d492604dd12bd7
Archive (13)
FilenameMD5File type
.gitignored7f90ae86d9e2b064449a1a16cce7ec4ASCII text
cluster.py480ded68ffdbb452388eab8ddc07884bPython script, ASCII text executable
README.txt4a609f6d75bf33e1ef3dfe96c1fef096ASCII text
WhitePaper.docx7da2d827d0ee2eb57aafa9e64c7e8d2aMicrosoft Word 2007+
final_assembly.txt604ff0951e2e0ef5151232ff66c095d3ASCII text
main.cpp436fe1e57289b8faf1a8c4566cd2fdeaC source, ASCII text
olly_loop_eax.txte8793484d346da33c3fb36c8c8748542ASCII text
sample_loop_eax.exe2df7c818464ab7eaf70178c4182bff76PE32 executable (console) Intel 80386, for MS Windows, 6 sections
vd.xmlb6829cb5595e32e9658fa2d00af99b3fASCII text
README.md2b4488a7ce4071b1ffe2e528480777e2ASCII text
utils.pycd0b972954aa0f8f388923f5816879e3Python script, ASCII text executable
VD_Peephole.pyd73bad114a92477fe713f1f9941a4730Python script, ASCII text executable
VirtualDeobfuscator.py3ec5b9b89a20dd1958a50a9e3bf3f821Python script, ASCII text executable

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize