Resubmissions

13-06-2022 02:20

220613-csswfshdd2 10

14-03-2022 14:39

220314-r1ar6sgeg8 8

General

  • Target

    7cc35fbce4b353c541f1ee62366248cc072d1c7ce38b1d5ef5db4a2414f26e08.7z

  • Size

    4.1MB

  • Sample

    220613-csswfshdd2

  • MD5

    9b49e076ce410d562694d2d35d8e493a

  • SHA1

    07aef34631c2cc62d080a70ca95caeb769c3067b

  • SHA256

    68749402189d3586400f890e0041322ecc8355cb8f009a470a247f7fdad61f46

  • SHA512

    beed820b3540dd291144a06cc0b0a2b188be720709b413cc6aa129aea1f2874beeb0e8856a66d2637eef1c8fe7268e8351f30cef7e1d9e9502ca33e7bc953241

Malware Config

Extracted

Family

jupyter

C2

http://146.70.53.153

Targets

    • Target

      Mto-Medical-Review-Form.exe

    • Size

      261.0MB

    • MD5

      7194384ed0ce511e24b0e119d0d068f6

    • SHA1

      9ea9e3f52602988a922e8d8fda000f060be2b248

    • SHA256

      7cc35fbce4b353c541f1ee62366248cc072d1c7ce38b1d5ef5db4a2414f26e08

    • SHA512

      0faea84e368d301b7b056630b82c9f2a49f01252e66f5699ddf81f879d22fc74e08a810252e87a58cd9e5b147e9c1682678308781d08fd65e2edb2c8017c98d7

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • suricata: ET MALWARE Jupyter Stealer CnC Checkin

      suricata: ET MALWARE Jupyter Stealer CnC Checkin

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks