General

  • Target

    FinalProject.zip

  • Size

    154.5MB

  • Sample

    240412-ag3keahe46

  • MD5

    eb7b1d88a69888b0ab040ad08ad8f6ac

  • SHA1

    3fbf15002163da6144c207618f790ddbb1e90835

  • SHA256

    c4bf2f8d61993d70afc39fc8bc41346b80e88df5b21bfd22034f1731478ddfc7

  • SHA512

    dbf78cad7ff5cf1617d806e5f37cd60339cd4cd29361c5f037e195beba3cfdbdca60181141770d95bd270b533dc1a5b9f7f9c7f14b9daf2a1bf852307ff0ba94

  • SSDEEP

    3145728:/2EEy82dzVQNJDTyCKlVwaSQCzFDLSbf3a6gJ0bZjA1EwE5QAElGT4l:Oj7HKzwxZDubzbt8Gu

Malware Config

Extracted

Family

jupyter

C2

http://146.70.71.174

Targets

    • Target

      FinalProject/Tools-Invoice.pdf.7z

    • Size

      2.0MB

    • MD5

      0cdc67b3f8a598bec1e06964536d5998

    • SHA1

      99c6c928f0a7843e422a89d578175ad011ea4f10

    • SHA256

      dbba073f0c88fe42a7614b65cb8db2f5ad346fdfb1e21763288d2d73e65c9b6f

    • SHA512

      4414cd2085a1d207d4d02d0cafd33cca7fcd0faa57c2264891b088ff8fd0b872cb45bf932fe49b72ca0e6611eb165e20f9a432d6d5c8daf73ecb042b77cb2326

    • SSDEEP

      49152:ZXWm5vNti62RUJhdigVRTX1uIpEI+1ZoEatFg0uU/:z26cUJhNnEImoJFg05/

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks