General

  • Target

    2127c8a38cfe9e30ef937d9cae0d7942

  • Size

    1.9MB

  • Sample

    231231-afxb1abehn

  • MD5

    2127c8a38cfe9e30ef937d9cae0d7942

  • SHA1

    332dbe70236126d887166bb5171640602b692ec8

  • SHA256

    b6428040dcd622d53afb53932a512a9dd36bb5cd6fc15ea43bf5fd0be3063cc1

  • SHA512

    7a753a278efb1de1370a4c51011a4de59d0143f3142051a2bd885806985247aac2e7cdc411c2b240b563cc182073550d4a19d3a963436651877133a781f6cfb5

  • SSDEEP

    49152:HfN0jJ/7ZwS9iLz+PcpiPMdF9VG03m0TslOOclUUFOevPIMjAyFOe+:HS1/7ZlAvAcpcMrZW0wwlHFOeIMpB+

Malware Config

Extracted

Family

jupyter

Version

AG-1

C2

http://167.88.15.115

Targets

    • Target

      4630b0be7226c9003d34717f7eb092eb51242bd9723d118b4b106c9727503a7b.bin

    • Size

      109.4MB

    • MD5

      6720015dcacecbfd3e14cfa40fb09464

    • SHA1

      e158076552c38ce35f68ad93e292c1c3a1fc4a1c

    • SHA256

      4630b0be7226c9003d34717f7eb092eb51242bd9723d118b4b106c9727503a7b

    • SHA512

      405ac883e0ee92715abc6c0d8a633045b909f29d1346b246c10e1b8271b336002847df0a2f031c6d83469306ecb6246e4881679babccf92d10e953ff0d7919fa

    • SSDEEP

      49152:Cqe3f6iJ+7ZgS9YLPcEcp6NMdFPVGw3mxPo+OOOrWUUFRevTycKArFD0o:bSi0+7ZVObvcpQMVTWxPYPWHFRe2czCo

    • Jupyter Backdoor/Client payload

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks