Report Overview

  1. Visited public
    2025-02-09 12:23:29
    Tags
  2. URL

    github.com/brunolee-GIT/W3M0dP4tch32/releases/download/Portable/Portable.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.3

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
11

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
aus5.mozilla.org25481998-01-242015-10-272025-02-05
github.com14232007-10-092016-07-132025-02-05
objects.githubusercontent.com1340602014-02-062021-11-012025-02-05

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    objects.githubusercontent.com/github-production-release-asset-2e65be/683566786/b4637575-f929-4913-b4b0-b9e77ba469e0?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250209%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250209T122257Z&X-Amz-Expires=300&X-Amz-Signature=ca62ea830326145563b216f0324aadf20a83cf483c7f54f733a122204e37fc22&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dportable.zip&response-content-type=application%2Foctet-stream

  2. IP

    185.199.108.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    4.4 MB (4439532 bytes)

  2. Hash

    e01bf7d5d6e945fd4c4b6264bbfb0e6e

    f795f56fdc28a10e6164f23c29c804391f4f7adf

  1. Archive (23)

  2. FilenameMd5File type
    init.json
    bdd1c6c14e71aff1070a0ee53496fbc6
    JSON text data
    000003.log
    2ac8bb9e347a6dcb69cfc1af7f89858f
    data
    000004.log
    62bd7c1e6cd3ea204dd4d0810bf43ea9
    data
    000005.ldb
    48db7901ba03c1837917f7413881a8a5
    data
    CURRENT
    46295cac801e5d4857d09837238a6394
    ASCII text
    LOCK
    d41d8cd98f00b204e9800998ecf8427e
    LOG
    db8bee1161f2b4e0b6474e87b0d5dbfb
    ASCII text
    MANIFEST-000001
    5af87dfd673ba2115e2fcf5cfdb727ab
    OpenPGP Secret Key
    7z.dll
    bbf51226a8670475f283a2d57460d46c
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    7z.exe
    fe522d8659618e3a50aafd8ac1518638
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    Asar.64.dll
    d58b5f3fd9f22b4995b3dc532a8cef21
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 9 sections
    binmay.exe
    dca474f8e8703a7ca2858dfe6d36a3f5
    PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, 2 sections
    PRO_GIFT
    c749f48ee2621a5d4782d3acd04cd490
    ASCII text, with very long lines (990), with no line terminators
    WPDUP.bat
    2507dd00dd5929332b83553fca64948c
    DOS batch file, ASCII text, with CRLF line terminators, with escape sequences
    WeMod Portable.exe
    b822ab0ddc77a25513dad600b0b77d76
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    WeMod Portable.ini
    75c11c509e01003abb9b20a1b496cb33
    ASCII text
    WeMod Local.ini
    0cae36fb0a884bd9d63029ea709a0f3c
    ASCII text, with CRLF line terminators
    WeMod Portable.ini
    b37c0c78a9004b1afb989c1f61d2ae0f
    ASCII text, with CRLF line terminators
    WeMod Updater.ini
    b7a31a18d7470f0397bac556bbd5b1d8
    ASCII text, with CRLF line terminators
    Readme.txt
    f07457adbb1b3694d20187dca4b2ea32
    ASCII text, with CRLF line terminators
    WeMod Local.exe
    46254aab89ed987c5cdeabd9fb723a45
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    WeMod Portable.exe
    a80f5aa9273488c4d5c621645cdaba79
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    WeMod Updater.exe
    bbf14bff51583eaa4d7e28256269239c
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious file path pointing to the root of a folder easily accessible via environment variables
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (3)

URLIPResponseSize
github.com/brunolee-GIT/W3M0dP4tch32/releases/download/Portable/Portable.zip
140.82.121.4302 Found0 B
objects.githubusercontent.com/github-production-release-asset-2e65be/683566786/b4637575-f929-4913-b4b0-b9e77ba469e0?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250209%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250209T122257Z&X-Amz-Expires=300&X-Amz-Signature=ca62ea830326145563b216f0324aadf20a83cf483c7f54f733a122204e37fc22&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dportable.zip&response-content-type=application%2Foctet-stream
185.199.108.133200 OK4.4 MB
aus5.mozilla.org/update/3/GMP/111.0a1/20240129201730/Linux_x86_64-gcc3/null/default/Linux%205.15.0-102-generic%20(GTK%203.24.41%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201200 OK444 B