General
-
Target
2fa89e3595694b92ea5022373a190ce7943b0261fb4eb3deed5351c54b3334bd
-
Size
26KB
-
Sample
221107-gst6qsbfc7
-
MD5
0d613686086de68f5cc925132dad3a70
-
SHA1
d26aa6a04330ca5611b8980d444be5d1e05e788a
-
SHA256
2fa89e3595694b92ea5022373a190ce7943b0261fb4eb3deed5351c54b3334bd
-
SHA512
d1634098b21b722c9b0b10afcccacca67b2bf656d5230d9ca39e9060b9be85897f3b0c4801627b6449652d0a056e0bae431a9c4bee39c8742253a02b1a44244c
-
SSDEEP
384:rG5Iu0DOSiBuMAjo/BNxf+yOhmwnh2ej0eohDTkVOhvF27z/FUxiWtBlwmRz:rG5JAyg9oNVo2eC9yoYf
Behavioral task
behavioral1
Sample
2fa89e3595694b92ea5022373a190ce7943b0261fb4eb3deed5351c54b3334bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2fa89e3595694b92ea5022373a190ce7943b0261fb4eb3deed5351c54b3334bd.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
joker
http://mmtie.oss-cn-hangzhou.aliyuncs.com
Targets
-
-
Target
2fa89e3595694b92ea5022373a190ce7943b0261fb4eb3deed5351c54b3334bd
-
Size
26KB
-
MD5
0d613686086de68f5cc925132dad3a70
-
SHA1
d26aa6a04330ca5611b8980d444be5d1e05e788a
-
SHA256
2fa89e3595694b92ea5022373a190ce7943b0261fb4eb3deed5351c54b3334bd
-
SHA512
d1634098b21b722c9b0b10afcccacca67b2bf656d5230d9ca39e9060b9be85897f3b0c4801627b6449652d0a056e0bae431a9c4bee39c8742253a02b1a44244c
-
SSDEEP
384:rG5Iu0DOSiBuMAjo/BNxf+yOhmwnh2ej0eohDTkVOhvF27z/FUxiWtBlwmRz:rG5JAyg9oNVo2eC9yoYf
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Registers COM server for autorun
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-