General
-
Target
https://github.com/TOP-executors/JJsploit/releases/download/v2.1.0/JJSPLOIT.V2.exe
-
Sample
250103-s4xlsa1mas
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/TOP-executors/JJsploit/releases/download/v2.1.0/JJSPLOIT.V2.exe
Resource
win11-20241007-en
windows11-21h2-x64
19 signatures
300 seconds
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
ROBLOX EXECUTOR
C2
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
Mutex
90faf922-159d-4166-b661-4ba16af8650e
Attributes
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Targets
-
-
Target
https://github.com/TOP-executors/JJsploit/releases/download/v2.1.0/JJSPLOIT.V2.exe
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-