General

  • Target

    MSERT.exe

  • Size

    119.9MB

  • Sample

    221101-wrzgdsehdn

  • MD5

    87760937585aab015532429fbe79efbc

  • SHA1

    39a2dd36a0c0b518f4bc9bc7436275b15aa2b15f

  • SHA256

    5362e897b9825bb3ad230ed44d0811cbe1f121c1dae11be1a9a8afe24a2d7f9e

  • SHA512

    628726cecf3df90c24fb9b7572704709438a965087aa01050a5a03245a5720927feb85124e1734e924656753a838ce83287fbd501e7c4b5241d2831f59cd7da5

  • SSDEEP

    3145728:bqtJE9xP4QNIobwsD3L8mcMIHvCDRWQbKHGOyy:au9l4QNIwcMIH6l3bK5

Malware Config

Extracted

Family

joker

C2

https://gustollc-com.oss-us-east-1.aliyuncs.com

Targets

    • Target

      MSERT.exe

    • Size

      119.9MB

    • MD5

      87760937585aab015532429fbe79efbc

    • SHA1

      39a2dd36a0c0b518f4bc9bc7436275b15aa2b15f

    • SHA256

      5362e897b9825bb3ad230ed44d0811cbe1f121c1dae11be1a9a8afe24a2d7f9e

    • SHA512

      628726cecf3df90c24fb9b7572704709438a965087aa01050a5a03245a5720927feb85124e1734e924656753a838ce83287fbd501e7c4b5241d2831f59cd7da5

    • SSDEEP

      3145728:bqtJE9xP4QNIobwsD3L8mcMIHvCDRWQbKHGOyy:au9l4QNIwcMIH6l3bK5

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Registers COM server for autorun

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks