General

  • Target

    installer-release (1).exe.zip

  • Size

    3.2MB

  • Sample

    231006-x3r25ahf58

  • MD5

    49afcde4611be4f6a52df2c9010f2fd0

  • SHA1

    c249e29c757d5fe9b70614bf0ce9938c0ebe83fd

  • SHA256

    e8e3ae0dc359a870c563c97646b076d2f5802821d030bb0478488067cd03d9bb

  • SHA512

    0a2e7c03558c0faf88d8021fa631104953790b4430555294c339c2cb636f04ee2cee03e772739d0831c0a5c3760621453ab0244f3d82b21b7a4fa8336162363e

  • SSDEEP

    24576:zmRsdDVum2cL0c3VdmXDAQhq2qzmLhMeb19YPJU:SRsxVumV73VA0qqUFhkG

Malware Config

Extracted

Family

jupyter

C2

http://45.86.163.163

Targets

    • Target

      installer-release (1).exe

    • Size

      302.2MB

    • MD5

      febc6d336543eef46a3443630eeb4fd9

    • SHA1

      9980a09285f878181ba03d50a22ec70ec33d7f3a

    • SHA256

      777cb8aae1e77e841b4981965198f62e60e55a4f910120980dc5ad997ab71fb5

    • SHA512

      b05607c33d732b5fe34a5017a6fdfea9681e304fa0fa80275a0bcaca98fe8595144622c8e4d40c36c1f84d5656d4e12f01f219f6297a2b09be4e3330a47ec59d

    • SSDEEP

      24576:guiIU/dvO49gI2wfnNwfORVwhNxrqOOJpb5sVE:gUmB9OANA7NZOX+VE

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks