Report Overview

  1. Visited public
    2024-12-08 03:11:10
    Tags
  2. URL

    prod-be-source.s3.amazonaws.com/Juxtrum.exe

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    52.219.152.109

    #16509 AMAZON-02

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
8

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
prod-be-source.s3.amazonaws.comunknown2005-08-182024-05-112024-12-05

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumprod-be-source.s3.amazonaws.com/Juxtrum.exeDetects XWorm RAT
mediumprod-be-source.s3.amazonaws.com/Juxtrum.exeDetect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
mediumprod-be-source.s3.amazonaws.com/Juxtrum.exeEXE_RAT_XWorm_April2024

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    prod-be-source.s3.amazonaws.com/Juxtrum.exe

  2. IP

    52.219.163.1

  3. ASN

    #16509 AMAZON-02

  1. File type

    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

    Size

    46 kB (46080 bytes)

  2. Hash

    67769f9120a30209fb33d79221b22dcb

    f87dd99033b516b085a5dd8f3dfe811cb41aa352

    Detections

    AnalyzerVerdictAlert
    RussianPanda public YARA rulesmalware
    Detects XWorm RAT
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    YARAhub by abuse.chmalware
    EXE_RAT_XWorm_April2024
    VirusTotalmalicious
    ClamAVmalicious
    Win.Packed.njRAT-10002074-1

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
prod-be-source.s3.amazonaws.com/Juxtrum.exe
52.219.163.1200 OK46 kB