General
-
Target
solarmarkerdropper.7z
-
Size
1.6MB
-
Sample
210926-r2e4aafaa8
-
MD5
5c828f80bb6ed5acbce17fb9b9bcfaaa
-
SHA1
43a93be2e452b0a3b602487639f5739ac90fa90e
-
SHA256
f0190f7407d0c6e1a4dfea3bd0967db95cd9c89274dafc1043524ff213840743
-
SHA512
1290f401b1b3ef98cca1d0676272d28ccca8352d2ee9ff8259df4a1793d27b36a7e12545db841774b38b3596cc31f555e4c22fbf98ddb6263b5f6a99120e944a
Static task
static1
Behavioral task
behavioral1
Sample
Adobe-Indesign-Business-Plan-Template-Free.msi
Resource
win7-en-20210920
Malware Config
Extracted
jupyter
SP-18
http://188.241.83.61
Targets
-
-
Target
Adobe-Indesign-Business-Plan-Template-Free.msi
-
Size
108.5MB
-
MD5
82dbf0d2b49de42dc700df7c96b41eb1
-
SHA1
509c08fd9805cf2034fec547c0fc962423a96a3b
-
SHA256
7ada6e666c34aacaf7c93d11ca2e563ec53da37fb23a181631809d0d5ef14387
-
SHA512
3d256fba291eb2f4a81ef53d8db8a333f3fb26a9a2c90e3c28bb0a944dc8bba2a2c8902232b14e6a9debdf93a2ff100faabb2be2053aac7fc2ccbdbd2f98fc83
-
Jupyter Backdoor/Client Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-