Analysis

  • max time kernel
    121s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    09/03/2022, 07:47

General

  • Target

    30da1c19c3a87b7c78c8c4059f5483784d42310858637756c3cbb624713bad48.exe

  • Size

    241KB

  • MD5

    ec50d14f4580a0bff42fc5d24d1ab8ec

  • SHA1

    114e65e3019411d17d2a8fb61a05e34bdaa3bc73

  • SHA256

    30da1c19c3a87b7c78c8c4059f5483784d42310858637756c3cbb624713bad48

  • SHA512

    5380231fb5cf762b527837c0379c753fc3b3a73750f516c34a85c9ad0457123ddcbe8749d64b6e698aa07aa0306ed45619b26173f43d8473a0895c4805b39944

Malware Config

Extracted

Family

jester

Botnet

FikusCode

C2

http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/FikusCode

https://api.anonfiles.com/upload?token=d26d620842507144

Mutex

46378331-3729-449c-9a03-94f385d10a9c

Attributes
  • license_key

    D1F0DE359CBD562CCF9326AEEEA8E64E

Signatures

  • Jester

    Jester is an information stealer malware written in C#.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30da1c19c3a87b7c78c8c4059f5483784d42310858637756c3cbb624713bad48.exe
    "C:\Users\Admin\AppData\Local\Temp\30da1c19c3a87b7c78c8c4059f5483784d42310858637756c3cbb624713bad48.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2248-130-0x000001FB40730000-0x000001FB40772000-memory.dmp

    Filesize

    264KB

  • memory/2248-131-0x00007FFCFFEE0000-0x00007FFD009A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2248-132-0x000001FB5C1E0000-0x000001FB5C1E2000-memory.dmp

    Filesize

    8KB