Resubmissions

12/11/2023, 16:32

231112-t2a6fahd85 10

General

  • Target

    Jellis Client 0.6.exe

  • Size

    17.6MB

  • Sample

    231112-t2a6fahd85

  • MD5

    a3f63799ac1983395a661715e5043378

  • SHA1

    f418968decc1102c75437d718f6abf7a684082a7

  • SHA256

    36ac8583bb9f04bdec32a5cb2bc2e6cb45aa7f9e31365644c115c58de3b93711

  • SHA512

    b35f784e1ac0f3c17772ea577182bb09c7524b6880f2f9216b9f9023f0129e1ef7bf3bbac3681bb52c0a984c3e6061bc474f1b06e6c2707927feb308227a31df

  • SSDEEP

    393216:wqPnLFXlr7gQpDOETgsvfG0g+evEkTXyaL3:xPLFXNEQoEj5X3o

Malware Config

Targets

    • Target

      Jellis Client 0.6.exe

    • Size

      17.6MB

    • MD5

      a3f63799ac1983395a661715e5043378

    • SHA1

      f418968decc1102c75437d718f6abf7a684082a7

    • SHA256

      36ac8583bb9f04bdec32a5cb2bc2e6cb45aa7f9e31365644c115c58de3b93711

    • SHA512

      b35f784e1ac0f3c17772ea577182bb09c7524b6880f2f9216b9f9023f0129e1ef7bf3bbac3681bb52c0a984c3e6061bc474f1b06e6c2707927feb308227a31df

    • SSDEEP

      393216:wqPnLFXlr7gQpDOETgsvfG0g+evEkTXyaL3:xPLFXNEQoEj5X3o

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks