General

  • Target

    4a1f68137625a901788445084cdc30e85d396373acb66d767c789f6f2c8b38f2.7z

  • Size

    1.3MB

  • Sample

    220701-mv4e3sedb5

  • MD5

    006413c208a9394c55cfca39b1e1f2d7

  • SHA1

    e9921ef8031566a88558026de5667bcd2a7b88d9

  • SHA256

    a2f684ac305c4b4c967bbc2989936aabe6dc6dea3dc9882c11736bf8da6ec538

  • SHA512

    5d8a6c9ef711637704ed154fd81cdf5d887fbb02f817038774a3d78862562965230dcc88f53988ffcdd979ae802ed47471a270d60b15f3d5dfb8202fa2917535

Malware Config

Targets

    • Target

      4a1f68137625a901788445084cdc30e85d396373acb66d767c789f6f2c8b38f2

    • Size

      273.0MB

    • MD5

      d936209f2f7b1192749804f6d99e4be7

    • SHA1

      4a3a5e3416974299da51719b3274d2916d3ed50c

    • SHA256

      4a1f68137625a901788445084cdc30e85d396373acb66d767c789f6f2c8b38f2

    • SHA512

      4b6ce5d7d8ae2078e06c4e1959828da503a68e5e23e41490baa8be7c91d5e79aa4556c8cb893f888f5419302c60054ea17cd81ddde3bd3617f86d7f3b4b9902d

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks