General

  • Target

    script.ps1

  • Size

    28KB

  • Sample

    230413-rrz1psdc8t

  • MD5

    5201bec05304172eb34578a483da40da

  • SHA1

    e4a91fd21e16639f759009a17e1f37df5c89f2b4

  • SHA256

    5a2366fb3d365e87f77a982d83eefb5054d50e8e73d2043979e5616c7071a458

  • SHA512

    7ea8de19029a90502fd6a472e1b449cdbf017a19e679d3383b34aea2af1e392de6216934640fd9d8c47fb8553759cde0880291ff2d187081ff9896746a276353

  • SSDEEP

    768:gPPLA+zYgibawLt4CGwmGGler9PdnH1LiGK:eT7zgbaItpdmGKyxdnViR

Malware Config

Extracted

Family

jupyter

Version

OC-8

C2

http://37.221.114.23

Targets

    • Target

      script.ps1

    • Size

      28KB

    • MD5

      5201bec05304172eb34578a483da40da

    • SHA1

      e4a91fd21e16639f759009a17e1f37df5c89f2b4

    • SHA256

      5a2366fb3d365e87f77a982d83eefb5054d50e8e73d2043979e5616c7071a458

    • SHA512

      7ea8de19029a90502fd6a472e1b449cdbf017a19e679d3383b34aea2af1e392de6216934640fd9d8c47fb8553759cde0880291ff2d187081ff9896746a276353

    • SSDEEP

      768:gPPLA+zYgibawLt4CGwmGGler9PdnH1LiGK:eT7zgbaItpdmGKyxdnViR

    • Jupyter Backdoor/Client payload

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Drops startup file

MITRE ATT&CK Matrix

Tasks