General
-
Target
Jellis Client 0.6.exe
-
Size
17.6MB
-
Sample
231112-t2a6fahd85
-
MD5
a3f63799ac1983395a661715e5043378
-
SHA1
f418968decc1102c75437d718f6abf7a684082a7
-
SHA256
36ac8583bb9f04bdec32a5cb2bc2e6cb45aa7f9e31365644c115c58de3b93711
-
SHA512
b35f784e1ac0f3c17772ea577182bb09c7524b6880f2f9216b9f9023f0129e1ef7bf3bbac3681bb52c0a984c3e6061bc474f1b06e6c2707927feb308227a31df
-
SSDEEP
393216:wqPnLFXlr7gQpDOETgsvfG0g+evEkTXyaL3:xPLFXNEQoEj5X3o
Behavioral task
behavioral1
Sample
Jellis Client 0.6.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Jellis Client 0.6.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
Jellis Client 0.6.exe
-
Size
17.6MB
-
MD5
a3f63799ac1983395a661715e5043378
-
SHA1
f418968decc1102c75437d718f6abf7a684082a7
-
SHA256
36ac8583bb9f04bdec32a5cb2bc2e6cb45aa7f9e31365644c115c58de3b93711
-
SHA512
b35f784e1ac0f3c17772ea577182bb09c7524b6880f2f9216b9f9023f0129e1ef7bf3bbac3681bb52c0a984c3e6061bc474f1b06e6c2707927feb308227a31df
-
SSDEEP
393216:wqPnLFXlr7gQpDOETgsvfG0g+evEkTXyaL3:xPLFXNEQoEj5X3o
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-