General

  • Target

    fe83311ce241e5b34fd0cfe567eb20039bdc8d2e6c71d02fdd2050b2a536fd2f

  • Size

    27KB

  • Sample

    221020-q5dtysgdc8

  • MD5

    48ef14c9e3f77ede2d868c1fe28154b0

  • SHA1

    de131002f2034948de8cf1a714ff8c11417abf34

  • SHA256

    fe83311ce241e5b34fd0cfe567eb20039bdc8d2e6c71d02fdd2050b2a536fd2f

  • SHA512

    f9f40838845cb01a66c1504db479eb9114c798f678b5d0f5314bc1636eb2d5be04c6e3c0f4053ef099cfcd6287742ee0d11e4bbda92983a8a80b5adf36973762

  • SSDEEP

    768:r51hwke4u9Ybj+i+RTf9PuONOsC9yoYf:rVFe4rbjsZpuRv+

Malware Config

Extracted

Family

joker

C2

http://tttie.oss-cn-shenzhen.aliyuncs.com

Targets

    • Target

      fe83311ce241e5b34fd0cfe567eb20039bdc8d2e6c71d02fdd2050b2a536fd2f

    • Size

      27KB

    • MD5

      48ef14c9e3f77ede2d868c1fe28154b0

    • SHA1

      de131002f2034948de8cf1a714ff8c11417abf34

    • SHA256

      fe83311ce241e5b34fd0cfe567eb20039bdc8d2e6c71d02fdd2050b2a536fd2f

    • SHA512

      f9f40838845cb01a66c1504db479eb9114c798f678b5d0f5314bc1636eb2d5be04c6e3c0f4053ef099cfcd6287742ee0d11e4bbda92983a8a80b5adf36973762

    • SSDEEP

      768:r51hwke4u9Ybj+i+RTf9PuONOsC9yoYf:rVFe4rbjsZpuRv+

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks