Behavioral task
behavioral1
Sample
30e527e45f50d2ba82865c5679a6fa998ee0a1755361ab01673950810d071c85.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30e527e45f50d2ba82865c5679a6fa998ee0a1755361ab01673950810d071c85.dll
Resource
win10v2004-20241007-en
General
-
Target
30e527e45f50d2ba82865c5679a6fa998ee0a1755361ab01673950810d071c85
-
Size
68KB
-
MD5
4eb6170524b5e18d95bb56b937e89b36
-
SHA1
f76e293d627c55eca18ce96e587fb8c6e37d8206
-
SHA256
30e527e45f50d2ba82865c5679a6fa998ee0a1755361ab01673950810d071c85
-
SHA512
65e616c84f36736732157be1004882a597d945eeceb96a5b125df93fb03bb09f2329bbfcebce94c9d8d2eeae2b2de1471842327cbbcd6bf246603830933053be
-
SSDEEP
768:RUed7+DWtOW5pkyO0EuAo8rl0BL8gDlJBMZ7wd2TmkaZH9nrh:RU0sCOaEuAo8x0BAGeZ7wduWH9n1
Malware Config
Signatures
-
Jupyter Backdoor/Client payload 1 IoCs
Processes:
resource yara_rule sample family_jupyter -
Jupyter family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 30e527e45f50d2ba82865c5679a6fa998ee0a1755361ab01673950810d071c85
Files
-
30e527e45f50d2ba82865c5679a6fa998ee0a1755361ab01673950810d071c85.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ