General

  • Target

    407384b3a0c685785566db5388ca05120a5474c0edb31b2860382bf570cecd22

  • Size

    4.0MB

  • Sample

    221104-11ynnsddcp

  • MD5

    ed9253d6466a3bf62574f135493f37d8

  • SHA1

    4b3f1c63539f8e7a5ade13b4af8ea65a5a922b2d

  • SHA256

    407384b3a0c685785566db5388ca05120a5474c0edb31b2860382bf570cecd22

  • SHA512

    c42a1bfcc7a29ccbb19764b908527b281e807893d9f21d207050f3d4d980389dc62c6fa1bbcb6c5c705e0f64d43b7d06222f37cd5f1bcd9e7c7b35c8382cce33

  • SSDEEP

    98304:YygSfpAzW/OM5K/u0KlQxG+wALyS8G+QHNLbSJwfVRucidoi7iwzIB6g:YygCpA62M5K/u0lw+4S83uLbLRi7iwz8

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      407384b3a0c685785566db5388ca05120a5474c0edb31b2860382bf570cecd22

    • Size

      4.0MB

    • MD5

      ed9253d6466a3bf62574f135493f37d8

    • SHA1

      4b3f1c63539f8e7a5ade13b4af8ea65a5a922b2d

    • SHA256

      407384b3a0c685785566db5388ca05120a5474c0edb31b2860382bf570cecd22

    • SHA512

      c42a1bfcc7a29ccbb19764b908527b281e807893d9f21d207050f3d4d980389dc62c6fa1bbcb6c5c705e0f64d43b7d06222f37cd5f1bcd9e7c7b35c8382cce33

    • SSDEEP

      98304:YygSfpAzW/OM5K/u0KlQxG+wALyS8G+QHNLbSJwfVRucidoi7iwzIB6g:YygCpA62M5K/u0lw+4S83uLbLRi7iwz8

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks