General

  • Target

    42c4617f359244e8406487a8c071bae282454cfa559d67129914c434b2c9e8b5

  • Size

    4.0MB

  • Sample

    221025-125hlseac3

  • MD5

    546080d309b1f912668386a57af9598a

  • SHA1

    4c496cfaab81d65be2e020dcfd1716a701e3c8ef

  • SHA256

    42c4617f359244e8406487a8c071bae282454cfa559d67129914c434b2c9e8b5

  • SHA512

    5cf4fece1a7d3ae12f588a8d832187791e74c18e4f80e01c7f8c84fc1f564984b4da7c702b430813971bbff1be10060c1346c7e6c8d446658968514a286ae4e3

  • SSDEEP

    98304:gfcWs9WeQdtaHMEgmRh1Gfpipr6MzHVFzcRNMyGx:ycW0WeOEME1hkxi16ML3yGx

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      42c4617f359244e8406487a8c071bae282454cfa559d67129914c434b2c9e8b5

    • Size

      4.0MB

    • MD5

      546080d309b1f912668386a57af9598a

    • SHA1

      4c496cfaab81d65be2e020dcfd1716a701e3c8ef

    • SHA256

      42c4617f359244e8406487a8c071bae282454cfa559d67129914c434b2c9e8b5

    • SHA512

      5cf4fece1a7d3ae12f588a8d832187791e74c18e4f80e01c7f8c84fc1f564984b4da7c702b430813971bbff1be10060c1346c7e6c8d446658968514a286ae4e3

    • SSDEEP

      98304:gfcWs9WeQdtaHMEgmRh1Gfpipr6MzHVFzcRNMyGx:ycW0WeOEME1hkxi16ML3yGx

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks