General
-
Target
19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090
-
Size
234KB
-
Sample
221003-1jwgzsggaj
-
MD5
de64daa4bbc8b6178e6389893d6de8f2
-
SHA1
422467f497fd81226d7cf2849cf78c4d6d16e528
-
SHA256
19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090
-
SHA512
c1e5aae2b49653d79c49e3fbf769145fc89ddb4d1f6fce136aa8f9c191d693ba65968222c85186a8b0a859da0924590dfe444f261808ff02def673c592fa0fd1
-
SSDEEP
6144:LVLxh5MCavp86MyOIqfV1fRbFnmnaEcI8tKoSLr:L535MCavpB+j9dBcnaEqAoSLr
Static task
static1
Behavioral task
behavioral1
Sample
19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
joker
https://lssfot.oss-cn-hangzhou.aliyuncs.com
Targets
-
-
Target
19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090
-
Size
234KB
-
MD5
de64daa4bbc8b6178e6389893d6de8f2
-
SHA1
422467f497fd81226d7cf2849cf78c4d6d16e528
-
SHA256
19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090
-
SHA512
c1e5aae2b49653d79c49e3fbf769145fc89ddb4d1f6fce136aa8f9c191d693ba65968222c85186a8b0a859da0924590dfe444f261808ff02def673c592fa0fd1
-
SSDEEP
6144:LVLxh5MCavp86MyOIqfV1fRbFnmnaEcI8tKoSLr:L535MCavpB+j9dBcnaEqAoSLr
Score10/10-
Downloads MZ/PE file
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-