General

  • Target

    eb642a90bfe0b537c3d87a2449a6b2817401ef9c273f95d7617f886a3e003f90

  • Size

    7.8MB

  • Sample

    241221-vafsaatmcl

  • MD5

    ba8d8522e8075c30e7439b85fb570753

  • SHA1

    08340b5f6c9177220fde8762e9170ba344e488c0

  • SHA256

    eb642a90bfe0b537c3d87a2449a6b2817401ef9c273f95d7617f886a3e003f90

  • SHA512

    207cfbc394544cf3eb8e8c50523f1fc2fe7946f034c28b53dbef19fdfba3efa8eb45bc6b7cdc80f0284fa3cdb265de8c80ff67db51e8f8f28fb44a9998def010

  • SSDEEP

    196608:P2vl+tJJxDLoZjLKwebMs9uJZmmNek8Wa0tSdwmEjUo5:P2veJJCNuwebMsHSeaSd+o8

Malware Config

Extracted

Family

jupyter

Version

AT-3

C2

http://185.236.202.137

Targets

    • Target

      aa5ba0f6ce6bb84632d0dda729c787961b751c237372aa47dc49dc8a8a9a749d

    • Size

      117.6MB

    • MD5

      015fd4bc87666d454f1517b2970dc097

    • SHA1

      88685aaaba4297deef30ac4fe9bd065baa7c0c0d

    • SHA256

      aa5ba0f6ce6bb84632d0dda729c787961b751c237372aa47dc49dc8a8a9a749d

    • SHA512

      ed3378510720b92fa77098c4d48763ea04e52c63bbbf074b711e16ef781281314dad6a7e0d3069bf0cd7598c1ea426b6effabd691ae0a945e79144afdd153637

    • SSDEEP

      393216:yE9KcOY3vAawF4vpUgCRNPAo1ffffffffffffffffffffffffffffffffffffffi:yE8cOwwF4WRNPAbJT

    • Jupyter Backdoor/Client payload

    • Jupyter family

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks