Report Overview

  1. Visited public
    2025-03-21 19:35:08
    Tags
  2. URL

    github.com/TOP-executors/JJsploit/releases/download/v2.1.0/JJSPLOIT.V2.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
objects.githubusercontent.com1340602014-02-062021-11-012025-03-19
github.com14232007-10-092016-07-132025-03-19

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumobjects.githubusercontent.com/github-production-release-asset-2e65be/877772159/a8b6bd16-5f97-4a30-8808-65c761396f62?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250321%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250321T193446Z&X-Amz-Expires=300&X-Amz-Signature=316af5ba4ff82c8014162aeb47d7efecdca500852c65ee3183787bcc6d6aacf7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DJJSPLOIT.V2.exe&response-content-type=application%2Foctet-streamDetects QuasarRAT malware
mediumobjects.githubusercontent.com/github-production-release-asset-2e65be/877772159/a8b6bd16-5f97-4a30-8808-65c761396f62?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250321%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250321T193446Z&X-Amz-Expires=300&X-Amz-Signature=316af5ba4ff82c8014162aeb47d7efecdca500852c65ee3183787bcc6d6aacf7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DJJSPLOIT.V2.exe&response-content-type=application%2Foctet-streamIdentify QuasarRAT samples

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    objects.githubusercontent.com/github-production-release-asset-2e65be/877772159/a8b6bd16-5f97-4a30-8808-65c761396f62?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250321%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250321T193446Z&X-Amz-Expires=300&X-Amz-Signature=316af5ba4ff82c8014162aeb47d7efecdca500852c65ee3183787bcc6d6aacf7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DJJSPLOIT.V2.exe&response-content-type=application%2Foctet-stream

  2. IP

    185.199.108.133

  3. ASN

    #54113 FASTLY

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    3.3 MB (3266048 bytes)

  2. Hash

    d4a776ea55e24d3124a6e0759fb0ac44

    f5932d234baccc992ca910ff12044e8965229852

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects QuasarRAT malware
    YARAhub by abuse.chmalware
    Identify QuasarRAT samples
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
objects.githubusercontent.com/github-production-release-asset-2e65be/877772159/a8b6bd16-5f97-4a30-8808-65c761396f62?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250321%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250321T193446Z&X-Amz-Expires=300&X-Amz-Signature=316af5ba4ff82c8014162aeb47d7efecdca500852c65ee3183787bcc6d6aacf7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DJJSPLOIT.V2.exe&response-content-type=application%2Foctet-stream
185.199.108.133200 OK3.3 MB
github.com/TOP-executors/JJsploit/releases/download/v2.1.0/JJSPLOIT.V2.exe
140.82.121.4302 Found3.3 MB