Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 22:32
Static task
static1
Behavioral task
behavioral1
Sample
5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe
Resource
win10v2004-20220812-en
General
-
Target
5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe
-
Size
32KB
-
MD5
3ed950593a08394614a0f3be0f38c72a
-
SHA1
b3134f9525779329b455ade41df60147301ecf9f
-
SHA256
5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08
-
SHA512
49a3494a645ac77f4e63a650457d0086ad031aee4eacdbd50726f9efe42fe26d6136433846f149f9be1b4acfbe3c582c0e402dfd824b26b96631d914de5f52c8
-
SSDEEP
768:/gDXeuVVH+JZBeyTMxi5Wxalke0X4/TeP37X:IDXeuVVH+J2yTMxi5WxdsKPj
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 1064 5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1064 5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5d1962129dca226814ee21bd0c775b222
SHA1b0c51425f0430cc8a6b4b8e27ad5132ec1a39797
SHA2564e9c316d64200ca654dd31b0c8bebc7f44133f01a3381ebf7c25bd8a62627ad3
SHA51289b5963a71c9fdd2fbdfbb9ee33d33b862663a9d1afe88a7dc7f85d3aca682ac3aed3d490779980dd9f07fbf5ff1e753605ca8dacc0c8a28585c149dc2788adf