General

  • Target

    dab3dde6b604078481c0e2e7f5932569276c79e943ff80b5ca86fcfc3e1475f9

  • Size

    46KB

  • Sample

    221021-e5ln1scbb5

  • MD5

    58a67f1e9941af97d4d4fe3bc39a294f

  • SHA1

    955d2e6eb77e1412ee4d0dd493a8b03f4f9e3446

  • SHA256

    dab3dde6b604078481c0e2e7f5932569276c79e943ff80b5ca86fcfc3e1475f9

  • SHA512

    ac917fa20e587f9dc10bd9c34b3180f3e85d7ece778619cf3272056de7b12d521f512b34f0b2c4b25471ea0467bdcb648b23056439e8eac6eaa2f34cd44d2828

  • SSDEEP

    768:dCObWQJdEEUSuyJlsCEQ6yz6zxktAZikqbC/oJxK2ZOZPYV1QL:bsSuynIUtAZikqbC/IxfZOS1I

Malware Config

Targets

    • Target

      dab3dde6b604078481c0e2e7f5932569276c79e943ff80b5ca86fcfc3e1475f9

    • Size

      46KB

    • MD5

      58a67f1e9941af97d4d4fe3bc39a294f

    • SHA1

      955d2e6eb77e1412ee4d0dd493a8b03f4f9e3446

    • SHA256

      dab3dde6b604078481c0e2e7f5932569276c79e943ff80b5ca86fcfc3e1475f9

    • SHA512

      ac917fa20e587f9dc10bd9c34b3180f3e85d7ece778619cf3272056de7b12d521f512b34f0b2c4b25471ea0467bdcb648b23056439e8eac6eaa2f34cd44d2828

    • SSDEEP

      768:dCObWQJdEEUSuyJlsCEQ6yz6zxktAZikqbC/oJxK2ZOZPYV1QL:bsSuynIUtAZikqbC/IxfZOS1I

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks