General

  • Target

    c15317f780b0f408415f2e0a9a7811737068964ebe96927fd58552727fe00b83

  • Size

    4.0MB

  • Sample

    221024-zxk3qsafa8

  • MD5

    9058fa47d074205aac12d95fb79bd53b

  • SHA1

    18415a9d6ebd25910e6be70e7d4ce5f9ec653120

  • SHA256

    c15317f780b0f408415f2e0a9a7811737068964ebe96927fd58552727fe00b83

  • SHA512

    2ab810d0ee3586230071e8f57216aa60002061420c46a0b4addf90dfe547d184cd80f1b00f17816b652db9463a28c90d8d0a14bd82b71f90769d92ce31b1d51c

  • SSDEEP

    98304:FPUpwKFQhvFGd6toOUVuwXWxiTsFtJ3L1ifCGJ:FPwT2FGGAVLXAT3RifCGJ

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      c15317f780b0f408415f2e0a9a7811737068964ebe96927fd58552727fe00b83

    • Size

      4.0MB

    • MD5

      9058fa47d074205aac12d95fb79bd53b

    • SHA1

      18415a9d6ebd25910e6be70e7d4ce5f9ec653120

    • SHA256

      c15317f780b0f408415f2e0a9a7811737068964ebe96927fd58552727fe00b83

    • SHA512

      2ab810d0ee3586230071e8f57216aa60002061420c46a0b4addf90dfe547d184cd80f1b00f17816b652db9463a28c90d8d0a14bd82b71f90769d92ce31b1d51c

    • SSDEEP

      98304:FPUpwKFQhvFGd6toOUVuwXWxiTsFtJ3L1ifCGJ:FPwT2FGGAVLXAT3RifCGJ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks