Overview
overview
7Static
static
7Jebel-serv..._amd64
macos-10.15-amd64
1Jebel-serv...ux_386
ubuntu-18.04-amd64
3Jebel-serv..._amd64
ubuntu-18.04-amd64
3Jebel-serv...ux_arm
debian-9-armhf
3Jebel-serv...x_mips
debian-9-mips
3Jebel-serv...mipsle
debian-9-mipsel
1Jebel-serv...86.exe
windows7-x64
7Jebel-serv...86.exe
windows10-2004-x64
7Jebel-serv...64.exe
windows7-x64
7Jebel-serv...64.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
Jebel-server/ReverseProxy_darwin_amd64
Resource
macos-20220504-en
Behavioral task
behavioral2
Sample
Jebel-server/ReverseProxy_linux_386
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral3
Sample
Jebel-server/ReverseProxy_linux_amd64
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral4
Sample
Jebel-server/ReverseProxy_linux_arm
Resource
debian9-armhf-20231026-en
Behavioral task
behavioral5
Sample
Jebel-server/ReverseProxy_linux_mips
Resource
debian9-mipsbe-20231026-en
Behavioral task
behavioral6
Sample
Jebel-server/ReverseProxy_linux_mipsle
Resource
debian9-mipsel-20231026-en
Behavioral task
behavioral7
Sample
Jebel-server/ReverseProxy_windows_386.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
Jebel-server/ReverseProxy_windows_386.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
Jebel-server/ReverseProxy_windows_amd64.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Jebel-server/ReverseProxy_windows_amd64.exe
Resource
win10v2004-20231020-en
General
-
Target
9adc7b753ab3673bfa07274f1ef3f759e323541a96c63226ca7f663bd7715e82.zip.zip
-
Size
11.4MB
-
MD5
7795f40d95037a7f715a2daa80a91aae
-
SHA1
bbf1c92d806440f951c87018c3c90a8eca990b49
-
SHA256
e53f065c45bf2a63bfbecbfc032fbb8ff9405c00b4f73f359b2b639e84b84f8f
-
SHA512
1db6b3833bb8996a18478e3c4cf9f775b99700487d814ed920b44211caede16fcd29fb2af404888d08cb4540dce87c4837910a170492152ff8cace4497a9e69d
-
SSDEEP
196608:Up6i3hbyHqCT2e0NfOoDhOIVcdLQxobGUMVKooNY3P6xuiZUYK4Duh50cPfRPuV0:UQCVKB2e03fGSOMLWSTiPo0cPefzjht2
Malware Config
Signatures
-
resource yara_rule static1/unpack002/Jebel-server/ReverseProxy_linux_386 upx static1/unpack002/Jebel-server/ReverseProxy_linux_amd64 upx static1/unpack002/Jebel-server/ReverseProxy_linux_arm upx static1/unpack002/Jebel-server/ReverseProxy_linux_mips upx static1/unpack002/Jebel-server/ReverseProxy_linux_mipsle upx static1/unpack002/Jebel-server/ReverseProxy_windows_386.exe upx static1/unpack002/Jebel-server/ReverseProxy_windows_amd64.exe upx -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack002/Jebel-server/ReverseProxy_windows_386.exe unpack006/out.upx unpack002/Jebel-server/ReverseProxy_windows_amd64.exe unpack007/out.upx
Files
-
9adc7b753ab3673bfa07274f1ef3f759e323541a96c63226ca7f663bd7715e82.zip.zip.zip
Password: infected
-
9adc7b753ab3673bfa07274f1ef3f759e323541a96c63226ca7f663bd7715e82.zip.zip
-
Jebel-server/ReverseProxy-1.4.tar.gz.gz
-
ReverseProxy-1.4.tar.tar
-
ReverseProxy-1.4/README.md
-
ReverseProxy-1.4/cmd.go
-
ReverseProxy-1.4/handle.go
-
ReverseProxy-1.4/main.go
-
Jebel-server/ReverseProxy-1.4.zip.zip
-
ReverseProxy-1.4/README.md
-
ReverseProxy-1.4/cmd.go
-
ReverseProxy-1.4/handle.go
-
ReverseProxy-1.4/main.go
-
Jebel-server/ReverseProxy_darwin_amd64.macho macos
-
Jebel-server/ReverseProxy_linux_386.elf linux x86
-
Jebel-server/ReverseProxy_linux_amd64.elf linux x64
-
Jebel-server/ReverseProxy_linux_arm.elf linux arm
-
Jebel-server/ReverseProxy_linux_mips.elf linux mipsbe
-
Jebel-server/ReverseProxy_linux_mipsle.elf linux mipsel
-
Jebel-server/ReverseProxy_windows_386.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 882B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Jebel-server/ReverseProxy_windows_amd64.exe.exe windows:4 windows x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 3.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 212KB - Virtual size: 342KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ