General

  • Target

    ed2b62dc8a2f6d3940862d5327f28ccdec857733d9339bd9a5df321e89da2401

  • Size

    54KB

  • Sample

    221002-lsz47shhe6

  • MD5

    6cd511d42c5a0a5ba4a4220b9c292183

  • SHA1

    d0b3456f5f0d53298d3814f63c2ac27f03080166

  • SHA256

    ed2b62dc8a2f6d3940862d5327f28ccdec857733d9339bd9a5df321e89da2401

  • SHA512

    ca0a047d638741d767d4d3fce6927ed361e53f8708b9e917cf4035d67283bdd7abb63016180c0076a65f7b22e95cc1d2a0e4d12a48c0a31ceb807ba1b1bf5c2a

  • SSDEEP

    768:sVKm4GV4ujtuYgFC5IjezJckOyLb172+oEFZ0TORX3iSHWIwjkdLv/kcH5hUDrpj:sQKV1MyVckOG12TGX1HxwjkVnDhI+HE

Malware Config

Targets

    • Target

      ed2b62dc8a2f6d3940862d5327f28ccdec857733d9339bd9a5df321e89da2401

    • Size

      54KB

    • MD5

      6cd511d42c5a0a5ba4a4220b9c292183

    • SHA1

      d0b3456f5f0d53298d3814f63c2ac27f03080166

    • SHA256

      ed2b62dc8a2f6d3940862d5327f28ccdec857733d9339bd9a5df321e89da2401

    • SHA512

      ca0a047d638741d767d4d3fce6927ed361e53f8708b9e917cf4035d67283bdd7abb63016180c0076a65f7b22e95cc1d2a0e4d12a48c0a31ceb807ba1b1bf5c2a

    • SSDEEP

      768:sVKm4GV4ujtuYgFC5IjezJckOyLb172+oEFZ0TORX3iSHWIwjkdLv/kcH5hUDrpj:sQKV1MyVckOG12TGX1HxwjkVnDhI+HE

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks