General

  • Target

    36d82451c1fc94fb28e50dec616b2f9bd9c777b46be7712347c2a88221fb9860

  • Size

    132KB

  • Sample

    221011-z6rlwaehg3

  • MD5

    643a9c4448920107f4c30f1bc1b083d0

  • SHA1

    4d7ae7feab4080e376a26f2a93803bd042278341

  • SHA256

    36d82451c1fc94fb28e50dec616b2f9bd9c777b46be7712347c2a88221fb9860

  • SHA512

    71999f37a4e98025e8b7db909cf87887ac9fd03266e400faad2ab351c2cf57b8b6ed02b0b158057f533cabf0b62443a2981accc792c643e01073ba096f33b58b

  • SSDEEP

    768:Na19jorBHSDLB3jOSno1PuOutC412lHyE5rUhJ:N69joroB3ynhufttkHyE5rU

Malware Config

Targets

    • Target

      36d82451c1fc94fb28e50dec616b2f9bd9c777b46be7712347c2a88221fb9860

    • Size

      132KB

    • MD5

      643a9c4448920107f4c30f1bc1b083d0

    • SHA1

      4d7ae7feab4080e376a26f2a93803bd042278341

    • SHA256

      36d82451c1fc94fb28e50dec616b2f9bd9c777b46be7712347c2a88221fb9860

    • SHA512

      71999f37a4e98025e8b7db909cf87887ac9fd03266e400faad2ab351c2cf57b8b6ed02b0b158057f533cabf0b62443a2981accc792c643e01073ba096f33b58b

    • SSDEEP

      768:Na19jorBHSDLB3jOSno1PuOutC412lHyE5rUhJ:N69joroB3ynhufttkHyE5rU

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks