General

  • Target

    cfed0dbbbe917ce74778c301dd59fbf5_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240405-lfktragd6t

  • MD5

    cfed0dbbbe917ce74778c301dd59fbf5

  • SHA1

    910dcceab42f617a8df06aa39ef9839e09d0b6c4

  • SHA256

    f94162fa02c3217376a4bd939ab3822c0040d5ba73fec279fd0b4b3415d02e98

  • SHA512

    28403bd05818a3647878e35ce83b59200f862b4aa2f9e197ccacc6c46414e782222c4df5d577123a3076c71c2aaef13e2c776023393b795489880b48c86491f9

  • SSDEEP

    49152:ATm7lXZdvBzQ6v6H78wG+VXAxGG7II6nEgNYUgd+lZuj:Wm/dvpQT78p+AwQtxp

Malware Config

Extracted

Family

jupyter

Version

SP-17

C2

http://188.241.83.61

Targets

    • Target

      Free-Business-Partner-Contract-Template.msi

    • Size

      109.5MB

    • MD5

      44d70c2dd1cdcfc30df95a6b676dc326

    • SHA1

      93846f239ecf71c1a8e067f880070a814868060b

    • SHA256

      0adfbce8a09d9f977e5fe90ccefc9612d1d742d980fe8dc889e10a5778592e4d

    • SHA512

      108cd1b9cb1fd387d20a06edc0be0e3e00ffc3b2dfe4d5dd636cd642072fa740311824dbdd1b403d8b650fc57d450dbae324ef2e22bed67f5467b6b4095aa80d

    • SSDEEP

      98304:TYsfUbJeGKExXADDHY2P9m6E1tsg/qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqm:TfUdD3xwXHY206y4LY

    • Jupyter Backdoor/Client payload

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Drops startup file

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks