Analysis
-
max time kernel
100s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 16:46
Behavioral task
behavioral1
Sample
8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe
Resource
win10v2004-20220721-en
General
-
Target
8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe
-
Size
1.4MB
-
MD5
a4dbb08ea279a189b13ae5eb926a82fa
-
SHA1
c1f0c28b659b534167c8887a29e74e11b3497974
-
SHA256
8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3
-
SHA512
cf265dc1576c383f7248b7c44fd8e029972e816f06d07b23cf861547989774f4f821a9d0b62bcecf77eac1fa507696b503c8309ce7324d54b3502e8c9d95947a
Malware Config
Extracted
joker
http://daohang1.oss-cn-beijing.aliyuncs.com
http://bbyz.oss-cn-shanghai.aliyuncs.com
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
resource yara_rule behavioral2/memory/548-131-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-132-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/548-174-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 548 8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe 548 8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 548 8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe 548 8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe 548 8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5f581898b2ff51c2ccca11993b693c628
SHA1f3477f50a088579c7d132e7846848b4196b4f488
SHA2564f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f
SHA51208bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294
-
Filesize
177KB
MD5f581898b2ff51c2ccca11993b693c628
SHA1f3477f50a088579c7d132e7846848b4196b4f488
SHA2564f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f
SHA51208bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294