General
-
Target
dd24c16b43c571c793a703796825d76f745e7e58218f84e3c0e2002cc53431b1
-
Size
26KB
-
Sample
221107-gssb5sdhgm
-
MD5
06120591ce43b67ee7590585fad20dd0
-
SHA1
2196b300f34090b6127a953be63026af7b8178a2
-
SHA256
dd24c16b43c571c793a703796825d76f745e7e58218f84e3c0e2002cc53431b1
-
SHA512
921677e25e1ee130ef16fbb34498ae2218eeabf0166cd128c1982106f91a8b8f8fb4315baf483acceb8b7cb79226bdefd7b0184232bba23a37398e3c6118af84
-
SSDEEP
384:rKbNhPbj62Tj9xec1JmLfBY5vX0kdamj0eohDTkVOhvF27z/FUxiWtBlwmRz:rKXm2Tbar+f0UamC9yoYf
Behavioral task
behavioral1
Sample
dd24c16b43c571c793a703796825d76f745e7e58218f84e3c0e2002cc53431b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd24c16b43c571c793a703796825d76f745e7e58218f84e3c0e2002cc53431b1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
joker
http://mmtie.oss-cn-hangzhou.aliyuncs.com
Targets
-
-
Target
dd24c16b43c571c793a703796825d76f745e7e58218f84e3c0e2002cc53431b1
-
Size
26KB
-
MD5
06120591ce43b67ee7590585fad20dd0
-
SHA1
2196b300f34090b6127a953be63026af7b8178a2
-
SHA256
dd24c16b43c571c793a703796825d76f745e7e58218f84e3c0e2002cc53431b1
-
SHA512
921677e25e1ee130ef16fbb34498ae2218eeabf0166cd128c1982106f91a8b8f8fb4315baf483acceb8b7cb79226bdefd7b0184232bba23a37398e3c6118af84
-
SSDEEP
384:rKbNhPbj62Tj9xec1JmLfBY5vX0kdamj0eohDTkVOhvF27z/FUxiWtBlwmRz:rKXm2Tbar+f0UamC9yoYf
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Registers COM server for autorun
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-