General

  • Target

    97ee6ce417a5aa0c0264056e7073407e97738b55645bfb03cf2e2ae34173a2c2

  • Size

    54KB

  • Sample

    221003-m8c52sdbd8

  • MD5

    0a3815fa462d80e8520ba9c617bbd285

  • SHA1

    4b6832eaa7e7c55877188b04efafc88bc1922279

  • SHA256

    97ee6ce417a5aa0c0264056e7073407e97738b55645bfb03cf2e2ae34173a2c2

  • SHA512

    f4dd2e7024504b8475557fdd313b4c2815f9c0f1dfd21308ed1314b8267d7f261eca589692cdb69405d110ff4838dc565b584cc9883ea58f5aee78ca5853f8e0

  • SSDEEP

    768:sVKm4GV4ujtuYgFC5IjezJckOyLb172+oEFZ0TORX3iSHWIwjkdLv/kcH5hUDrpg:sQKV1MyVckOG12TGX1HxwjkVnDhI+HL

Malware Config

Targets

    • Target

      97ee6ce417a5aa0c0264056e7073407e97738b55645bfb03cf2e2ae34173a2c2

    • Size

      54KB

    • MD5

      0a3815fa462d80e8520ba9c617bbd285

    • SHA1

      4b6832eaa7e7c55877188b04efafc88bc1922279

    • SHA256

      97ee6ce417a5aa0c0264056e7073407e97738b55645bfb03cf2e2ae34173a2c2

    • SHA512

      f4dd2e7024504b8475557fdd313b4c2815f9c0f1dfd21308ed1314b8267d7f261eca589692cdb69405d110ff4838dc565b584cc9883ea58f5aee78ca5853f8e0

    • SSDEEP

      768:sVKm4GV4ujtuYgFC5IjezJckOyLb172+oEFZ0TORX3iSHWIwjkdLv/kcH5hUDrpg:sQKV1MyVckOG12TGX1HxwjkVnDhI+HL

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

3
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks