General

  • Target

    10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b.bin

  • Size

    223KB

  • Sample

    220309-jmk2zshggr

  • MD5

    8879ae061540ce3de496adec3683b0fe

  • SHA1

    4b5f73578a49ca01cc2ba7b414bcf1edfbefa079

  • SHA256

    10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b

  • SHA512

    bf01d7738c47c1f24dab0e70643568f99b73049804a53ac23b492c80e2558aa4166a84d4c247bf3149523096a7379ca4835a24abc6de18cf38d45562e0b98da3

Malware Config

Extracted

Family

jester

Botnet

ads555man

C2

http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/ads555man

https://api.anonfiles.com/upload?token=d26d620842507144

Mutex

efbb42d7-d0db-4f16-a194-3d9d9d1fc654

Attributes
  • license_key

    65EEBAF23D4744267D131CD5BA37E706

Targets

    • Target

      10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b.bin

    • Size

      223KB

    • MD5

      8879ae061540ce3de496adec3683b0fe

    • SHA1

      4b5f73578a49ca01cc2ba7b414bcf1edfbefa079

    • SHA256

      10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b

    • SHA512

      bf01d7738c47c1f24dab0e70643568f99b73049804a53ac23b492c80e2558aa4166a84d4c247bf3149523096a7379ca4835a24abc6de18cf38d45562e0b98da3

    • Jester

      Jester is an information stealer malware written in C#.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks