General

  • Target

    869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e

  • Size

    1.1MB

  • Sample

    221030-g67zrafef6

  • MD5

    a26369f797590c4e519bcf5088567904

  • SHA1

    b308396e4b0776e8dbec0288bb36dd7b4988dacb

  • SHA256

    869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e

  • SHA512

    f43935cf498e40e0774a4b9f2ecde718f3a165ccaf337da091e5e5ad15d16354d93b2ae60c11574dcdb30c62b0dc2502095d412387074ede2ab6129ef64d3873

  • SSDEEP

    24576:CFE//Tct4bOsAgXi/PdSmAL/stGYHLdU2SMO1N2h7HZ5ytBB7+p3uMnRs:QSVAgXiwOLHL+2BpHqjB60F

Malware Config

Targets

    • Target

      869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e

    • Size

      1.1MB

    • MD5

      a26369f797590c4e519bcf5088567904

    • SHA1

      b308396e4b0776e8dbec0288bb36dd7b4988dacb

    • SHA256

      869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e

    • SHA512

      f43935cf498e40e0774a4b9f2ecde718f3a165ccaf337da091e5e5ad15d16354d93b2ae60c11574dcdb30c62b0dc2502095d412387074ede2ab6129ef64d3873

    • SSDEEP

      24576:CFE//Tct4bOsAgXi/PdSmAL/stGYHLdU2SMO1N2h7HZ5ytBB7+p3uMnRs:QSVAgXiwOLHL+2BpHqjB60F

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v6

Tasks