Report Overview

  1. Visited public
    2025-01-30 01:00:36
    Tags
  2. URL

    github.com/Grozniy1/folder/raw/refs/heads/main/444.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132025-01-29
raw.githubusercontent.com358022014-02-062014-03-012025-01-29

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumraw.githubusercontent.com/Grozniy1/folder/refs/heads/main/444.exeDetect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
mediumraw.githubusercontent.com/Grozniy1/folder/refs/heads/main/444.exeWindows.Trojan.Njrat

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/Grozniy1/folder/refs/heads/main/444.exe

  2. IP

    185.199.108.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    38 kB (37888 bytes)

  2. Hash

    fb0bdd758f8a9f405e6af2358da06ae1

    6c283ab5e49e6fe3a93a996f850a5639fc49e3f5

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    Elastic Security YARA Rulesmalware
    Windows.Trojan.Njrat
    VirusTotalmalicious
    ClamAVmalicious
    Win.Packed.Bladabindi-7994427-0

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/Grozniy1/folder/raw/refs/heads/main/444.exe
140.82.121.4302 Found0 B
raw.githubusercontent.com/Grozniy1/folder/refs/heads/main/444.exe
185.199.108.133200 OK38 kB