General

  • Target

    235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9

  • Size

    160KB

  • Sample

    221013-2enf9agga6

  • MD5

    61ec2f1e4cb8f360bf05023710b4b1ff

  • SHA1

    0983e56d0e2f57fc6f5dcf94883a0f3ab7b6cb84

  • SHA256

    235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9

  • SHA512

    878be4abdd3f290e71e4b290f5cc1cc0c18083470107f758fc8e37c9564280de199b775ad4b6bdd9e9487419d2767fae3502d69cbecae09c4ea103eb22fa2776

  • SSDEEP

    1536:o0K3a3E5YW/io2C+I4LQ54z2B814KX6hN2DDwRCPERykcb+L:I3aE5/io2C+I4LQ54z2C14KK3W8RCm/

Malware Config

Targets

    • Target

      235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9

    • Size

      160KB

    • MD5

      61ec2f1e4cb8f360bf05023710b4b1ff

    • SHA1

      0983e56d0e2f57fc6f5dcf94883a0f3ab7b6cb84

    • SHA256

      235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9

    • SHA512

      878be4abdd3f290e71e4b290f5cc1cc0c18083470107f758fc8e37c9564280de199b775ad4b6bdd9e9487419d2767fae3502d69cbecae09c4ea103eb22fa2776

    • SSDEEP

      1536:o0K3a3E5YW/io2C+I4LQ54z2B814KX6hN2DDwRCPERykcb+L:I3aE5/io2C+I4LQ54z2C14KK3W8RCm/

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks