General

  • Target

    JaffaCakes118_9388f792b8af50445cc5d86161b4a735898570fcb71a47cad2d67dbd2d1f4213

  • Size

    7.9MB

  • Sample

    241224-zz71aaxmet

  • MD5

    2fd33998df9d66bda4acd2b7f2d34ec3

  • SHA1

    fe9d75fe4a0f9e972e9f5424b23a742d970c0768

  • SHA256

    9388f792b8af50445cc5d86161b4a735898570fcb71a47cad2d67dbd2d1f4213

  • SHA512

    81a01754759514154af6b1b4be74d4f50844215561185d9f08722d82729599a954aef694d27b44b83c8b29933ec3a5dca5bf319fcbfe960de03e9c0b13f498b2

  • SSDEEP

    196608:405vXQbUPm7QZxTcDp0iUAnGPzhe0WCNy2k44:42PQwPm8Pq1jyfWEv4

Malware Config

Extracted

Family

jupyter

Version

RB6

C2

http://192.121.87.53

Targets

    • Target

      8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1

    • Size

      107.7MB

    • MD5

      e4b18058271e4c9bfc7e3759a6132437

    • SHA1

      70248c40ca94932a7f098a26ee7858bda5903d73

    • SHA256

      8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1

    • SHA512

      4bf709dc7e3e32d7a694732b60150ea97b834465a8074d6b3d4acab0633d3e6f2a96d211f04c58397032bf60e8b4e172c775c95b3afe8765f8e2f1b650c6a045

    • SSDEEP

      196608:+P3tq/qkMTe5v9OhQ4XPH7tNSdDawF4eEpUgCRNj7AJZQzJ////////////////X:+P9KcOY3vAawF4vpUgCRNPAotbcJG

    • Jupyter Backdoor/Client payload

    • Jupyter family

    • Jupyter, SolarMarker

      Jupyter is a backdoor and infostealer first seen in mid 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks