General

  • Target

    JJSploit_8.10.15_x64_en-US.msi

  • Size

    5.1MB

  • Sample

    250328-26ey7attfy

  • MD5

    cc9626b9eb05fcc4f0a12616e2c23504

  • SHA1

    70ef30a35c8cd3cf2dbaff4dcdf47c33fedbec85

  • SHA256

    f468617180d78e999eaed9139fef635874f0cb791d1ceb6642a364d7d366a32f

  • SHA512

    5ad2999acec2f2161582c973366592b035dd52d167d8d7e3d1358ad75ec4bf7a74b5c4f06cf51110227498a1881f67970b5a1d1e0adeb7b1c901bcd259fbac3d

  • SSDEEP

    98304:GbGNUrEtdzbkOQYaDaAtmtcljz7hZW79bQPUxpoxssPMSBvDl0CxLzKWa8v8m:21mdbkruAt38bQPKo+sPBvB0eLzKWa

Malware Config

Targets

    • Target

      JJSploit_8.10.15_x64_en-US.msi

    • Size

      5.1MB

    • MD5

      cc9626b9eb05fcc4f0a12616e2c23504

    • SHA1

      70ef30a35c8cd3cf2dbaff4dcdf47c33fedbec85

    • SHA256

      f468617180d78e999eaed9139fef635874f0cb791d1ceb6642a364d7d366a32f

    • SHA512

      5ad2999acec2f2161582c973366592b035dd52d167d8d7e3d1358ad75ec4bf7a74b5c4f06cf51110227498a1881f67970b5a1d1e0adeb7b1c901bcd259fbac3d

    • SSDEEP

      98304:GbGNUrEtdzbkOQYaDaAtmtcljz7hZW79bQPUxpoxssPMSBvDl0CxLzKWa8v8m:21mdbkruAt38bQPKo+sPBvB0eLzKWa

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

MITRE ATT&CK Enterprise v15

Tasks