General

  • Target

    JaffaCakes118_d55bef20fb35bfa047a9e798033c7b7a55b0ca0ace429e309a3d7cf67b29b8bf

  • Size

    43KB

  • Sample

    241222-hhdxfayjfk

  • MD5

    3d270a47a320aeb46d7876e3a2963f4e

  • SHA1

    3bae99a4be8447ddb89f7fe5c97cf015ffe2f5b5

  • SHA256

    d55bef20fb35bfa047a9e798033c7b7a55b0ca0ace429e309a3d7cf67b29b8bf

  • SHA512

    d9d712b834e126aade1d9c5cf7ce6f26cb3d85b5e8bfeaebae13ea78cab986e60fef585f595675b1053837d26eb60379b4c239a624523ed3f93951d60a00abe0

  • SSDEEP

    768:C4FZN7HvLSuibLD8oOmfI4zZR/w6I3nxJE9I005L1ntpd90VVf7zIoT6VCSPS:C4FZN7H2N8EfLNR7I3nxJEe00ZluJzTr

Malware Config

Extracted

Family

jupyter

Version

OC-12

C2

http://92.204.160.233

Targets

    • Target

      eb6bc8b129be5249bada70182e4de5d14036b9d45db954ecfd2559da1e17053f

    • Size

      65KB

    • MD5

      12269047226f5871f1993084f95cf496

    • SHA1

      b1f37fc678807b17f19cce8e31d8fd254d52eea1

    • SHA256

      eb6bc8b129be5249bada70182e4de5d14036b9d45db954ecfd2559da1e17053f

    • SHA512

      49be3c32c8feb9051c456195485d092d2ed448e70e29bfc9b673f87de81b5495c8dcaa51b3d0c4553d7f0fb42aaa00c81d7df7470db5444029d638968cdbcc5e

    • SSDEEP

      1536:TB/0A9qWmZeyDuI4SAtB6aDN8wLDscn4JTIBp53L2o6E:SzZTuI4p61aDsH2yo6E

    • Jupyter Backdoor/Client payload

    • Jupyter family

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks