General

  • Target

    6f4d22d96bcd7fd67c7bea25afeba3bc75019438dcf6bd5e7172babecac7d783

  • Size

    1.4MB

  • Sample

    221003-x7jljscfdp

  • MD5

    4235cab41c63e6aee740a64cd6e6d420

  • SHA1

    e2f4c29518e23e67a43efe97f9b8c8d04df533d7

  • SHA256

    6f4d22d96bcd7fd67c7bea25afeba3bc75019438dcf6bd5e7172babecac7d783

  • SHA512

    4af90ceaacf588ef9b0acf5d962a01d7c27a9cb92ce6f2c424b481e14a555dde6cd66667353601c2b22d32053cffe5088b64c598c47333c6e686a4687303c8db

  • SSDEEP

    24576:m+jrIku0ve6aXTD3ADNdRwUG91UO8mdBVV5Ukqe2GVrfuybYd37ji4utaw+E4CX3:NjrIkPelDD3ADnRwUG9BBv2kqe2GVrfd

Malware Config

Extracted

Family

joker

C2

http://iyuweiskin.oss-cn-beijing.aliyuncs.com

Targets

    • Target

      6f4d22d96bcd7fd67c7bea25afeba3bc75019438dcf6bd5e7172babecac7d783

    • Size

      1.4MB

    • MD5

      4235cab41c63e6aee740a64cd6e6d420

    • SHA1

      e2f4c29518e23e67a43efe97f9b8c8d04df533d7

    • SHA256

      6f4d22d96bcd7fd67c7bea25afeba3bc75019438dcf6bd5e7172babecac7d783

    • SHA512

      4af90ceaacf588ef9b0acf5d962a01d7c27a9cb92ce6f2c424b481e14a555dde6cd66667353601c2b22d32053cffe5088b64c598c47333c6e686a4687303c8db

    • SSDEEP

      24576:m+jrIku0ve6aXTD3ADNdRwUG91UO8mdBVV5Ukqe2GVrfuybYd37ji4utaw+E4CX3:NjrIkPelDD3ADnRwUG9BBv2kqe2GVrfd

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks