Behavioral task
behavioral1
Sample
4072-621-0x000001FFBDE40000-0x000001FFBDEEC000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4072-621-0x000001FFBDE40000-0x000001FFBDEEC000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
4072-621-0x000001FFBDE40000-0x000001FFBDEEC000-memory.dmp
-
Size
688KB
-
MD5
0fbdd37c62b4716fdbe3c67171f97df8
-
SHA1
3e7ea4e3b6b74341be6ae3228fce53ed21df057a
-
SHA256
2ac127700550cc09b54ab9ac8265981aafe2cffa00bd7dd261deac88ca2bbaff
-
SHA512
01da21744ed63041045ca05cd38307ac41ab8a43b1ff04618193465ddc94524715f8fb171382d94d2b81e72a9e472e7edc10af0f9e4f1d1bb5bd989605b44f48
-
SSDEEP
12288:fFncoujisOG4lHUh8CDRJT8VVT7WgyyJ:VFjsoUQDh
Malware Config
Extracted
jupyter
http://146.70.86.142
Signatures
-
Jupyter family
Files
-
4072-621-0x000001FFBDE40000-0x000001FFBDEEC000-memory.dmp.dll windows x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorDllMain
Sections
.text Size: 663KB - Virtual size: 663KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ