General

  • Target

    cbd039ec638d36525560fe7e8e099eab_JaffaCakes118

  • Size

    11.2MB

  • Sample

    241206-jh5ktswrgz

  • MD5

    cbd039ec638d36525560fe7e8e099eab

  • SHA1

    f1e003266371488cdac42e56e8d11a5b709385cd

  • SHA256

    659d0068bbfb9ac0b53dd19025cb1a181d12599ec69595d0d1081e69d13fbbea

  • SHA512

    ba70dfeff4795c7e0f1c9dd56de26a929ba22b953229fb9d1ba7fb26750b45b103811d2ecc328aea8e05619ed248ea0cd9aff4364a6d73d9e0c539a2a65d7c7d

  • SSDEEP

    196608:qRz+XOuNCtiKT6LkhGYvJGWo/fEX1oGA1BWYQE+Oaeo0Re/PEwev0SS+lEP+tm41:qRSOuNCz6Lkh1QoEwYQE+Bh0Nw9gEomA

Malware Config

Extracted

Family

jupyter

Version

IL-5

C2

http://185.244.213.64

Targets

    • Target

      7ce31f51f539761f9922bec50d38c6b9c0d6cc3a912517d947bc0a49dd507026

    • Size

      118.8MB

    • MD5

      318799e4892e75fc62dc351d311e701d

    • SHA1

      888d333a39a871c3aff5cf1b7c0af2e4eae1e834

    • SHA256

      7ce31f51f539761f9922bec50d38c6b9c0d6cc3a912517d947bc0a49dd507026

    • SHA512

      260e1726edfae089cf972472c233f616cb5c3e9da8b63632a525ea1191cc9231fa1543aace28db470a2e25fd51b88a48dfca6b634b42ecee3feb50fef7f28531

    • SSDEEP

      393216:DpzBr1SCF0LIUYuFBmY54NEZPb+ON8IoJn:DFBrxM5YuF4jNePbHxoJn

    • Jupyter Backdoor/Client payload

    • Jupyter family

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks