General
-
Target
a6312c774e6236345d9b385a19343707_JaffaCakes118
-
Size
13.4MB
-
Sample
241127-gb1xyszncx
-
MD5
a6312c774e6236345d9b385a19343707
-
SHA1
f0b551ef317752d1acaa66acbeb65f3b43ef1b73
-
SHA256
0fe32cc2b4e3b1f029c70ca830eec5a68dc73e8445f841ae66e6a940fb432920
-
SHA512
46132e7c8699a924eb4a4ef8c2f313261e695b507296fb146ffbc9b45e78bd3249f52759981c1122c6b3db342491fa6bbb0cc4481bdca000ceedc1b37c9aae97
-
SSDEEP
196608:9SjFnCA8CiIFtTohJjuvuFDWJe+kIWFYDjnyjoSlwxPTXDVdaDcJaqL7Rp9hezLT:9uDNBJ2wUKzZxxLpdaDcJhbjeSd1EL
Static task
static1
Behavioral task
behavioral1
Sample
187e204c5c30b9b56ccc82df510c4c215cdfd37b475d1edba9a0631a4d82ae2e.exe
Resource
win7-20240708-en
Malware Config
Extracted
jupyter
IN-8
http://46.102.152.102
Targets
-
-
Target
187e204c5c30b9b56ccc82df510c4c215cdfd37b475d1edba9a0631a4d82ae2e
-
Size
111.3MB
-
MD5
1d35a68322f7974885b356fa6fb9f109
-
SHA1
7db27496b351910e2578883f0c7dc460cb185937
-
SHA256
187e204c5c30b9b56ccc82df510c4c215cdfd37b475d1edba9a0631a4d82ae2e
-
SHA512
d7530ee6fea488edc8aa06eedf398c3e50ddfcdf3285ef8efe7f33764ec68305e13d4311124c00c3565f74a4c0fe1e50714aa9241dd7012f4febed6be73ab02e
-
SSDEEP
786432:e2mmmvNTsec3E9shN1ew5A5BMvj2222222222222222222222222222222222224:VVmVTTgE9QA5GMh
-
Jupyter Backdoor/Client payload
-
Jupyter family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-