General

  • Target

    a6312c774e6236345d9b385a19343707_JaffaCakes118

  • Size

    13.4MB

  • Sample

    241127-gb1xyszncx

  • MD5

    a6312c774e6236345d9b385a19343707

  • SHA1

    f0b551ef317752d1acaa66acbeb65f3b43ef1b73

  • SHA256

    0fe32cc2b4e3b1f029c70ca830eec5a68dc73e8445f841ae66e6a940fb432920

  • SHA512

    46132e7c8699a924eb4a4ef8c2f313261e695b507296fb146ffbc9b45e78bd3249f52759981c1122c6b3db342491fa6bbb0cc4481bdca000ceedc1b37c9aae97

  • SSDEEP

    196608:9SjFnCA8CiIFtTohJjuvuFDWJe+kIWFYDjnyjoSlwxPTXDVdaDcJaqL7Rp9hezLT:9uDNBJ2wUKzZxxLpdaDcJhbjeSd1EL

Malware Config

Extracted

Family

jupyter

Version

IN-8

C2

http://46.102.152.102

Targets

    • Target

      187e204c5c30b9b56ccc82df510c4c215cdfd37b475d1edba9a0631a4d82ae2e

    • Size

      111.3MB

    • MD5

      1d35a68322f7974885b356fa6fb9f109

    • SHA1

      7db27496b351910e2578883f0c7dc460cb185937

    • SHA256

      187e204c5c30b9b56ccc82df510c4c215cdfd37b475d1edba9a0631a4d82ae2e

    • SHA512

      d7530ee6fea488edc8aa06eedf398c3e50ddfcdf3285ef8efe7f33764ec68305e13d4311124c00c3565f74a4c0fe1e50714aa9241dd7012f4febed6be73ab02e

    • SSDEEP

      786432:e2mmmvNTsec3E9shN1ew5A5BMvj2222222222222222222222222222222222224:VVmVTTgE9QA5GMh

    • Jupyter Backdoor/Client payload

    • Jupyter family

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks