General

  • Target

    a286becab98d9cffbc1cf4bf9755302a46247145fab84401c02aff82f47541f8

  • Size

    46KB

  • Sample

    221012-16671aefeq

  • MD5

    7b0e22256ca84a9f36affb4ebec87598

  • SHA1

    77a786e61339ad2f8075b1bad1ac813edac5e24b

  • SHA256

    a286becab98d9cffbc1cf4bf9755302a46247145fab84401c02aff82f47541f8

  • SHA512

    e7a7bd897cdd57ecae4d031b4ab35e77ba8949cc8191d8af11879b15e1ee9dd37b65aef667a3d99baeb850ade25454a19c09f87aba16e786eeea136c9621a21c

  • SSDEEP

    768:rFzj+w97y5nP1fkml51yK30XYi8RU1ODA3sq+146CtUeVbSjFNBW3qjUVLO:rFzj+xPKm1l0XYVU1n8tyz2eVboAajuy

Malware Config

Targets

    • Target

      a286becab98d9cffbc1cf4bf9755302a46247145fab84401c02aff82f47541f8

    • Size

      46KB

    • MD5

      7b0e22256ca84a9f36affb4ebec87598

    • SHA1

      77a786e61339ad2f8075b1bad1ac813edac5e24b

    • SHA256

      a286becab98d9cffbc1cf4bf9755302a46247145fab84401c02aff82f47541f8

    • SHA512

      e7a7bd897cdd57ecae4d031b4ab35e77ba8949cc8191d8af11879b15e1ee9dd37b65aef667a3d99baeb850ade25454a19c09f87aba16e786eeea136c9621a21c

    • SSDEEP

      768:rFzj+w97y5nP1fkml51yK30XYi8RU1ODA3sq+146CtUeVbSjFNBW3qjUVLO:rFzj+xPKm1l0XYVU1n8tyz2eVboAajuy

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks