General

  • Target

    863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2

  • Size

    2.5MB

  • Sample

    220724-esa2raehh2

  • MD5

    595dc3d8d8aa210a9583a719aefa3903

  • SHA1

    046bae99cac144b097e6535d0824b52422d86be5

  • SHA256

    863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2

  • SHA512

    1e8c361e5df1d3c89088078feb322e8676d5e4935f5e7e5beb2fe581f62cffebdf292f52c6cd0cb5072460e18c1b0e2604df31686b2991935fb742a0b8aff095

Malware Config

Targets

    • Target

      863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2

    • Size

      2.5MB

    • MD5

      595dc3d8d8aa210a9583a719aefa3903

    • SHA1

      046bae99cac144b097e6535d0824b52422d86be5

    • SHA256

      863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2

    • SHA512

      1e8c361e5df1d3c89088078feb322e8676d5e4935f5e7e5beb2fe581f62cffebdf292f52c6cd0cb5072460e18c1b0e2604df31686b2991935fb742a0b8aff095

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks