General
-
Target
cfed0dbbbe917ce74778c301dd59fbf5_JaffaCakes118
-
Size
1.6MB
-
Sample
240405-lfktragd6t
-
MD5
cfed0dbbbe917ce74778c301dd59fbf5
-
SHA1
910dcceab42f617a8df06aa39ef9839e09d0b6c4
-
SHA256
f94162fa02c3217376a4bd939ab3822c0040d5ba73fec279fd0b4b3415d02e98
-
SHA512
28403bd05818a3647878e35ce83b59200f862b4aa2f9e197ccacc6c46414e782222c4df5d577123a3076c71c2aaef13e2c776023393b795489880b48c86491f9
-
SSDEEP
49152:ATm7lXZdvBzQ6v6H78wG+VXAxGG7II6nEgNYUgd+lZuj:Wm/dvpQT78p+AwQtxp
Static task
static1
Behavioral task
behavioral1
Sample
Free-Business-Partner-Contract-Template.msi
Resource
win7-20240221-en
Malware Config
Extracted
jupyter
SP-17
http://188.241.83.61
Targets
-
-
Target
Free-Business-Partner-Contract-Template.msi
-
Size
109.5MB
-
MD5
44d70c2dd1cdcfc30df95a6b676dc326
-
SHA1
93846f239ecf71c1a8e067f880070a814868060b
-
SHA256
0adfbce8a09d9f977e5fe90ccefc9612d1d742d980fe8dc889e10a5778592e4d
-
SHA512
108cd1b9cb1fd387d20a06edc0be0e3e00ffc3b2dfe4d5dd636cd642072fa740311824dbdd1b403d8b650fc57d450dbae324ef2e22bed67f5467b6b4095aa80d
-
SSDEEP
98304:TYsfUbJeGKExXADDHY2P9m6E1tsg/qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqm:TfUdD3xwXHY206y4LY
-
Jupyter Backdoor/Client payload
-
Drops startup file
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-