General

  • Target

    784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4

  • Size

    4.0MB

  • Sample

    221107-29c9rsebf9

  • MD5

    40e741054de924186fc92ca28e367f1f

  • SHA1

    0181be7e0a4f6354fed8c7438ee42528945bedac

  • SHA256

    784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4

  • SHA512

    e267b4fd931c2b3efd63d1dcfd21d0f8681d5cead8ae8865b167cab73772eb9e3eadd5a88eb1b4bf768696266c57cbd11ca5b3d8164a818821e0f4e3fc538127

  • SSDEEP

    98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBr:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBr

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4

    • Size

      4.0MB

    • MD5

      40e741054de924186fc92ca28e367f1f

    • SHA1

      0181be7e0a4f6354fed8c7438ee42528945bedac

    • SHA256

      784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4

    • SHA512

      e267b4fd931c2b3efd63d1dcfd21d0f8681d5cead8ae8865b167cab73772eb9e3eadd5a88eb1b4bf768696266c57cbd11ca5b3d8164a818821e0f4e3fc538127

    • SSDEEP

      98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBr:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBr

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks