General
-
Target
7cc35fbce4b353c541f1ee62366248cc072d1c7ce38b1d5ef5db4a2414f26e08.7z
-
Size
4.1MB
-
Sample
220613-csswfshdd2
-
MD5
9b49e076ce410d562694d2d35d8e493a
-
SHA1
07aef34631c2cc62d080a70ca95caeb769c3067b
-
SHA256
68749402189d3586400f890e0041322ecc8355cb8f009a470a247f7fdad61f46
-
SHA512
beed820b3540dd291144a06cc0b0a2b188be720709b413cc6aa129aea1f2874beeb0e8856a66d2637eef1c8fe7268e8351f30cef7e1d9e9502ca33e7bc953241
Static task
static1
Malware Config
Extracted
jupyter
http://146.70.53.153
Targets
-
-
Target
Mto-Medical-Review-Form.exe
-
Size
261.0MB
-
MD5
7194384ed0ce511e24b0e119d0d068f6
-
SHA1
9ea9e3f52602988a922e8d8fda000f060be2b248
-
SHA256
7cc35fbce4b353c541f1ee62366248cc072d1c7ce38b1d5ef5db4a2414f26e08
-
SHA512
0faea84e368d301b7b056630b82c9f2a49f01252e66f5699ddf81f879d22fc74e08a810252e87a58cd9e5b147e9c1682678308781d08fd65e2edb2c8017c98d7
-
suricata: ET MALWARE Jupyter Stealer CnC Checkin
suricata: ET MALWARE Jupyter Stealer CnC Checkin
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-