General
-
Target
00b40ca7dfb0f6a3bcf03af3ae97475ce2e293470596b2920e84430169d16873
-
Size
32KB
-
Sample
221107-r9be3aegdm
-
MD5
0c51633393c89951fe967a2c0e975330
-
SHA1
4a6aaf430cf5b06f5b3d3434c7cbb5707bee4329
-
SHA256
00b40ca7dfb0f6a3bcf03af3ae97475ce2e293470596b2920e84430169d16873
-
SHA512
9fcddb433c574c0ec3e5409b8936ba0b6c01488c6d71f384f46b8011fab8eb513ba36b082fd7b30fd50c6c0d7fa13a71122ad00838a7b4166ee62024f4347415
-
SSDEEP
768:rp1WbPH59kgi2fKACIaFleZQWTGBxMLfb41CYR/9m:rXWbZltfjCHwQWT/81L
Behavioral task
behavioral1
Sample
00b40ca7dfb0f6a3bcf03af3ae97475ce2e293470596b2920e84430169d16873.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
00b40ca7dfb0f6a3bcf03af3ae97475ce2e293470596b2920e84430169d16873.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
joker
http://mmtie.oss-cn-hangzhou.aliyuncs.com
Targets
-
-
Target
00b40ca7dfb0f6a3bcf03af3ae97475ce2e293470596b2920e84430169d16873
-
Size
32KB
-
MD5
0c51633393c89951fe967a2c0e975330
-
SHA1
4a6aaf430cf5b06f5b3d3434c7cbb5707bee4329
-
SHA256
00b40ca7dfb0f6a3bcf03af3ae97475ce2e293470596b2920e84430169d16873
-
SHA512
9fcddb433c574c0ec3e5409b8936ba0b6c01488c6d71f384f46b8011fab8eb513ba36b082fd7b30fd50c6c0d7fa13a71122ad00838a7b4166ee62024f4347415
-
SSDEEP
768:rp1WbPH59kgi2fKACIaFleZQWTGBxMLfb41CYR/9m:rXWbZltfjCHwQWT/81L
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Registers COM server for autorun
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-