-
Notifications
You must be signed in to change notification settings - Fork 14
Expand file tree
/
Copy pathJmagic_IOCs.txt
More file actions
36 lines (29 loc) · 1.27 KB
/
Jmagic_IOCs.txt
File metadata and controls
36 lines (29 loc) · 1.27 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
File hashes:
Full copy of the agent
sha1:7edc911b31b4f5dc401725c9b52e876a9fd00f3e
sha256:5e3c128749f7ae4616a4620e0b53c0e5381724a790bba8314acb502ce7334df2
Truncated version of the file above, this version only contains the first 50Kbs
sha256:957c0c135b50d1c209840ec7ead60912a5ccefd2873bf5722cb85354cea4eb37
Previously identified cd00r variant reported in barracuda campaign UNC4841
sha256:3f26a13f023ad0dcd7f2aa4e7771bba74910ee227b4b36ff72edc5f07336f115
File Name:
JunoscriptService
Process names:
‘[nfsiod 0]’ - this corresponds to the cd00r agent
‘[nfsiod 1]’ - this corresponds to the remote shell process
Certificate
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuJDBIgz2Gb70ExKb7fww
W3WHqCKcWCXT8vt7leycqLTN00X9K / aCyH8jEkXXcbV / +rRsLrgpBsSUIl7MJjtZ
gTYGyYC9Lpi2bNRO + Enzy4R3rkNeuUmPFT95gHW6UPTaKoyfDuuV7FFTogzoGr9l
NIqLtsP0uyQJBJk8DSVBfX / 3SQ7d / lGfTbAe / fp9tuiXXY2crW7LTNLeNGfQ4UCD
WeE48wwYMYg591UbU4hB59dwpEG + NyHohPF + HuQBF3o9b7wCrjxNRAMYO3G / U0l8
H2CryABe + PP7qS4Y / 0 / F7HHq5qLhMOELWiVNR0ymDn7 + dBrND1erTm5rS7Afav8k
pQIDAQAB
-----END PUBLIC KEY-----
Command and Control IP address
198.46.158[.]172
First: January 3, 2024
Last: April 21, 2024
X.509 Sha256 Fingerprint
sha256:C7cf51499973908cbc4c746f689b6ed245b26b1a9eae62fe9329f3a1036e82f4