Jolly Jellyfish
Image Description
Common Information
Type Value
UUID beddd297-e50f-4f09-8ffb-a31e7589a80c
Fingerprint 96c9b951db4f2b11e94e118c451f9a3181c321be8b9e97f181342ca788d82f0b
Analysis status DONE
Considered CTI value 2
Text language
Published Feb. 9, 2023, 3:48 p.m.
Added to db Nov. 6, 2024, 11:07 a.m.
Last updated Nov. 6, 2024, 11:09 a.m.
Headline Jolly Jellyfish
Title Jolly Jellyfish
Detected Hints/Tags/Attributes 54/4/50
Attributes
Details Type #Events CTI Value
Details Domain 3
download.google-images.ml
Details Domain 1
monpass.mn
Details Domain 1
micsoftin.us
Details Domain 53
ncsc.gov.uk
Details Email 22
ncscinfoleg@ncsc.gov.uk
Details File 1
browser_plugin.exe
Details File 6
bk.exe
Details File 1
x37.bmp
Details File 1
aili.pdf
Details File 8
all.exe
Details File 1
37.bmp
Details File 1
83.bmp
Details File 1
save.bmp
Details md5 1
abcd461bdb6a6537b7a36848a87b5ea6
Details md5 1
a241ff3d86925a4a12916b401536b019
Details md5 1
738f46546f6d4a79e2d917b26bf8a93a
Details md5 1
014dac67e8c32a25ccb024d1d1017b58
Details md5 1
a8c4ac44a5aa9d22319fe4b20cc5e790
Details md5 1
a465f18c7e50500c6b6f94741ef56b2f
Details sha1 1
e99d5a620a488133f4da24e1f8d2d5e68542b6f3
Details sha1 1
d28eacb1b4d2e9ef54f7dff09ca03a6866fc9184
Details sha1 1
834e80f6fa9935fd3184c25e4e37b0a068a773ee
Details sha1 1
ba5558d79dadc12bbbe07e3444441d51d5e5931e
Details sha1 1
7c348809e99c0be3ba5c122009a2cd15ad50b7bf
Details sha1 1
b5053ceba7e45c956f601e77ed1ca4546f372221
Details sha256 1
f21a9c69bfca6f0633ba1e669e5cf86bd8fc55b2529cd9b064ff9e2e129525e8
Details sha256 3
a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97
Details sha256 1
4a43fa8a3305c2a17f6a383fb68f02515f589ba112c6e95f570ce421cc690910
Details sha256 1
0df3b6e2535f8bb564183ab4e5e47d9b30ffc0204cc5bda1bae8984cdc418410
Details sha256 1
f0449c41bc3eebb8ea025fafc5b0cd1fcbe9a2d80c447ecc00cf3cab43e1c311
Details sha256 1
17b4cf337cf4fa466a4a1bdc69795c2f96ef7b42464839dafbaf8502e28a3193
Details IPv4 2
37.61.205.212
Details IPv4 2
172.20.10.6
Details MITRE ATT&CK Techniques 97
T1497.001
Details MITRE ATT&CK Techniques 57
T1497.003
Details MITRE ATT&CK Techniques 442
T1071.001
Details MITRE ATT&CK Techniques 75
T1001
Details MITRE ATT&CK Techniques 6
T1001.002
Details Pdb 3
c:\users\test\desktop\fishmaster\x64\release\fishmaster.pdb
Details Pdb 1
fishmaster.pdb
Details Url 1
http://37.61.205.212:8880/dow/aili.pdf
Details Url 1
https://monpass.mn/storage/uploads/download_files/monpass.client.inst
Details Url 1
http://download.google-images.ml:8880/downloa/37.bmp
Details Url 1
http://download.google-images.ml:8880/download/x37.bmp
Details Url 1
http://micsoftin.us:2086/dow/83.bmp
Details Url 1
http://172.20.10.6/save.bmp
Details Yara rule 1
rule JollyJellyfish_unique_messagebox_display_string {
	meta:
		author = "NCSC"
		description = "Detects the string displayed by the message box in 
some variants of Jolly Jellyfish"
		date = "2021-12-15"
		hash1 = "d28eacb1b4d2e9ef54f7dff09ca03a6866fc9184"
		hash2 = "834e80f6fa9935fd3184c25e4e37b0a068a773ee"
	strings:
		$popuptext = { E4 AF C0 C0 C6 F7 B2 E5 BC FE D2 D1 BE AD B3 C9 B9 A6 B8 FC D0 C2 A3 AC C7 EB D6 D8 C6 F4 E4 AF C0 C0 C6 F7 A3 A1 }
	condition:
		uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550 and all of them
}
Details Yara rule 1
rule JollyJellyfish_check_memory_greater_1gb {
	meta:
		author = "NCSC"
		description = "Detects Jolly Jellyfish check for memory being 
greater than 1GB"
		date = "2021-12-15"
		hash1 = "e99d5a620a488133f4da24e1f8d2d5e68542b6f3"
		hash2 = "d28eacb1b4d2e9ef54f7dff09ca03a6866fc9184"
		hash3 = "834e80f6fa9935fd3184c25e4e37b0a068a773ee"
		hash4 = "ba5558d79dadc12bbbe07e3444441d51d5e5931e"
	strings:
		$1 = { 33 D2 48 8B 44 ?? 38 B9 00 04 00 00 48 F7 F1 33 D2 B9 00 04 00 00 48 F7 F1 89 44 ?? ?? 81 7C ?? ?? 00 04 00 00 }
		$2 = { 48 8B 44 ?? 38 48 C1 E8 14 ?? 00 04 00 00 }
	condition:
		uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550 and any of them
}
Details Yara rule 1
rule JollyJellyfish_pdb_string {
	meta:
		author = "NCSC"
		description = "Detects the Jolly Jellyfish PDB string"
		date = "2021-12-15"
		hash1 = "e99d5a620a488133f4da24e1f8d2d5e68542b6f3"
		hash2 = "834e80f6fa9935fd3184c25e4e37b0a068a773ee"
		hash3 = "d28eacb1b4d2e9ef54f7dff09ca03a6866fc9184"
		hash4 = "ba5558d79dadc12bbbe07e3444441d51d5e5931e"
	strings:
		$pdb = "fishmaster.pdb"
	condition:
		uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550 and any of them
}
Details Yara rule 1
rule JollyJellyfish_identify_shellcode_start_addr {
	meta:
		author = "NCSC"
		description = "Detects Jolly Jellyfish finding the start address 
of the shellcode in the downloaded data"
		date = "2021-12-15"
		hash1 = "e99d5a620a488133f4da24e1f8d2d5e68542b6f3"
		hash2 = "d28eacb1b4d2e9ef54f7dff09ca03a6866fc9184"
		hash3 = "834e80f6fa9935fd3184c25e4e37b0a068a773ee"
		hash4 = "ba5558d79dadc12bbbe07e3444441d51d5e5931e"
	strings:
		$1 = { 48 89 84 24 ?? 00 00 00 48 8B 84 24 ?? 00 00 00 8B 40 0A 48 8B 4C 24 ?? 48 8D 44 01 03 }
		$2 = { 8B 43 0A 48 83 C0 03 48 03 D8 }
	condition:
		uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550 and any of them
}