Report Overview
Visitedpublic
2025-03-21 19:35:08
Tags
Submit Tags
URL
github.com/TOP-executors/JJsploit/releases/download/v2.1.0/JJSPLOIT.V2.exe
Finishing URL
about:privatebrowsing
IP / ASN
140.82.121.4
#36459 GITHUB
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
objects.githubusercontent.com
1340602014-02-062021-11-012025-03-19
github.com
14232007-10-092016-07-132025-03-19

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumobjects.githubusercontent.com/github-production-release-asset-2e65be/877772159/a8b6bd16-5f97-4a30-8808-65c761396f62?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250321%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250321T193446Z&X-Amz-Expires=300&X-Amz-Signature=316af5ba4ff82c8014162aeb47d7efecdca500852c65ee3183787bcc6d6aacf7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DJJSPLOIT.V2.exe&response-content-type=application%2Foctet-streamDetects QuasarRAT malware
mediumobjects.githubusercontent.com/github-production-release-asset-2e65be/877772159/a8b6bd16-5f97-4a30-8808-65c761396f62?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250321%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250321T193446Z&X-Amz-Expires=300&X-Amz-Signature=316af5ba4ff82c8014162aeb47d7efecdca500852c65ee3183787bcc6d6aacf7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DJJSPLOIT.V2.exe&response-content-type=application%2Foctet-streamIdentify QuasarRAT samples

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
objects.githubusercontent.com/github-production-release-asset-2e65be/877772159/a8b6bd16-5f97-4a30-8808-65c761396f62?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250321%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250321T193446Z&X-Amz-Expires=300&X-Amz-Signature=316af5ba4ff82c8014162aeb47d7efecdca500852c65ee3183787bcc6d6aacf7&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DJJSPLOIT.V2.exe&response-content-type=application%2Foctet-stream
IP / ASN
185.199.108.133
#54113 FASTLY
File Overview
File TypePE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
Size3.3 MB (3266048 bytes)
MD5d4a776ea55e24d3124a6e0759fb0ac44
SHA1f5932d234baccc992ca910ff12044e8965229852

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Detects QuasarRAT malware
YARAhub by abuse.chmalware
Identify QuasarRAT samples
VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize