General

  • Target

    41b0f1f1cec6e608a040195a09009e33

  • Size

    1.2MB

  • Sample

    240104-xxdbsahhf6

  • MD5

    41b0f1f1cec6e608a040195a09009e33

  • SHA1

    deb8843ef3af5672a36412f9b7e8782740ea9043

  • SHA256

    44c467e9271a6c66e41ec8861fbade44f3d6c553859e0b5da8decde453ca297b

  • SHA512

    a05fd34289899ff02e04c2d13cc784bebe5b87e4b1133c80b209e82a17b271716fa0fab4ec318f3b1ab5e95e49b448a2aef0fe44c1b51ebdd7da848276fa72d8

  • SSDEEP

    24576:auyDzWIPanzIwpxuDqFxBdZDjUJGh1MBULW+oZMUKwVAvTLAM852K:dyXPaZpxXFxBHD4sqBYWruAuv3U52K

Malware Config

Extracted

Family

jupyter

Version

AG-4

C2

http://167.88.15.115

Targets

    • Target

      b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67

    • Size

      101.7MB

    • MD5

      1916a0852f4643bd6634b6153868e8f8

    • SHA1

      276de9ea30ea7cbc414c1be9fac3c3d8c61c5b29

    • SHA256

      b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67

    • SHA512

      9212bd1dbe930f6334160b7ec0fe5eff9f3ef62a6eb5d488fdc4b05640c9556d435327a622201453b48eb43966ad67ce29bc927a2d94e1d857942f1086ea4ca4

    • SSDEEP

      49152:Cqe3f61222222222222222222222222222222222222222222222222222222228:bSiCQxHjUd3JDcgF

    • Jupyter Backdoor/Client payload

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks