Analysis
-
max time kernel
46s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 05:06
Static task
static1
Behavioral task
behavioral1
Sample
0a4c6ff865ba4e4b17b96b8f30334081.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a4c6ff865ba4e4b17b96b8f30334081.exe
Resource
win10v2004-20220901-en
General
-
Target
0a4c6ff865ba4e4b17b96b8f30334081.exe
-
Size
337KB
-
MD5
0a4c6ff865ba4e4b17b96b8f30334081
-
SHA1
fbfc8bf5f0175307daec3936875a6e1efeab0b3c
-
SHA256
c30ae6be087aba1ed4b6ad06ca815e2ddb926b8823eef3b57e0b9f8cdd82900c
-
SHA512
7fdb16ca5644c9fe5d7ebecc7df3695a67cd49605e961f8f8957162e3b098063b45dce1b13161c59ce8b40a0d2002d7a8469483f1baee6ca7bc4d76525177002
-
SSDEEP
6144:2Bec5nsgkjGiXAmqmFuZxPZw4IDx89TRExqhQkfc+l2hgrM5zXvrgz:25iLNXApmFuZxPZEatFhQkfcASjfg
Malware Config
Extracted
joker
http://shetian1.oss-cn-beijing.aliyuncs.com
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1764 0a4c6ff865ba4e4b17b96b8f30334081.exe 1764 0a4c6ff865ba4e4b17b96b8f30334081.exe 1764 0a4c6ff865ba4e4b17b96b8f30334081.exe 1764 0a4c6ff865ba4e4b17b96b8f30334081.exe