Analysis
-
max time kernel
4294183s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
09-03-2022 07:47
Behavioral task
behavioral1
Sample
5e248950e37b653abd4c353113b932d71143d3431a47a728c1d6d135d4825735.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
5e248950e37b653abd4c353113b932d71143d3431a47a728c1d6d135d4825735.exe
-
Size
241KB
-
MD5
b4422d077f1f2f23f4525d6b538ce5cf
-
SHA1
01395e0750d3864d426e026b345f8727583b01c3
-
SHA256
5e248950e37b653abd4c353113b932d71143d3431a47a728c1d6d135d4825735
-
SHA512
d3fd71a930d046414129c8fcc1e8fe07e0802d2f0d28f0f82f28bbbb6eef212dcb823bf4b74c77b9ca55b4b59e0f1af78f0cd0dbfc1d0ce48d771173b036667d
Malware Config
Extracted
Family
jester
Botnet
FikusCode
C2
http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/FikusCode
https://api.anonfiles.com/upload?token=d26d620842507144
Mutex
46378331-3729-449c-9a03-94f385d10a9c
Attributes
-
license_key
D1F0DE359CBD562CCF9326AEEEA8E64E
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5e248950e37b653abd4c353113b932d71143d3431a47a728c1d6d135d4825735.exedescription pid process Token: SeDebugPrivilege 824 5e248950e37b653abd4c353113b932d71143d3431a47a728c1d6d135d4825735.exe