General
-
Target
eaf0a33663ec3456f79f6f8cd9bafd06_JaffaCakes118
-
Size
13.5MB
-
Sample
240410-ndgqesdf93
-
MD5
eaf0a33663ec3456f79f6f8cd9bafd06
-
SHA1
10c7260e75fff37edc0d03407d821983b4a2e527
-
SHA256
c90b059163c2e19952d3223afb985ae950c35060a8cb39560bcbd1b4c398884d
-
SHA512
ba9a2f89619e4711317b88053fc0317171defef99db674ab61ea512e89fb92c3364176f4db193de8684247b9a5f32d5a67332e56c2703cd63d63bf74e0ca7937
-
SSDEEP
393216:ynJP39Z2sW50wLe15VDtQx6So8RZEiwf/GTLF:yJfLqrLecXokZEiKAF
Static task
static1
Behavioral task
behavioral1
Sample
77fa1b6fc7f192b0c983d1f8ecc73effae4f688a49439a7df27e76cfba870d23.exe
Resource
win7-20240221-en
Malware Config
Extracted
jupyter
IN-5
http://46.102.152.102
Targets
-
-
Target
77fa1b6fc7f192b0c983d1f8ecc73effae4f688a49439a7df27e76cfba870d23
-
Size
111.3MB
-
MD5
0528d25fbaff11e69be186da25057e70
-
SHA1
bfd60e47cdedd1f0f1a1e6a3b9d0dcee72537120
-
SHA256
77fa1b6fc7f192b0c983d1f8ecc73effae4f688a49439a7df27e76cfba870d23
-
SHA512
ff4d9c6f764dce822e669f2b20811e6fa1a98a21db37ad464621a1252e6ba75619c650001b5e699876903324d3d151a7a859abf27d68e6f54143bbc2b89f0af3
-
SSDEEP
393216:2YQJsv6tWKFdu9Ct3KXFmvflTsvQsFF8c3E9YjhHt1ew5vHNTAEN7RW11vQ6iRxV:D23mmvNTsec3E9shN1ew5A5BMvOc
-
Jupyter Backdoor/Client payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-