General

  • Target

    53cec6614709a86e2db53004cef0053a409639447d49069268d82f03b1bedac2

  • Size

    1.9MB

  • Sample

    220726-xmcx9sdccp

  • MD5

    e39937e85a9881addc7ccc9bb63a392d

  • SHA1

    3993ed08f23a086c110ca68e743c18fce358b18c

  • SHA256

    53cec6614709a86e2db53004cef0053a409639447d49069268d82f03b1bedac2

  • SHA512

    801f46aa6e1008a478b82a105661f160fceb3a8c10d8bca624c748a1306dd46a54f9f7563eef3f17a77ef8d997de287044900523a4530ff9e8edc17089376eac

Malware Config

Targets

    • Target

      53cec6614709a86e2db53004cef0053a409639447d49069268d82f03b1bedac2

    • Size

      1.9MB

    • MD5

      e39937e85a9881addc7ccc9bb63a392d

    • SHA1

      3993ed08f23a086c110ca68e743c18fce358b18c

    • SHA256

      53cec6614709a86e2db53004cef0053a409639447d49069268d82f03b1bedac2

    • SHA512

      801f46aa6e1008a478b82a105661f160fceb3a8c10d8bca624c748a1306dd46a54f9f7563eef3f17a77ef8d997de287044900523a4530ff9e8edc17089376eac

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks