General

  • Target

    0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b

  • Size

    4.0MB

  • Sample

    221108-1r6mxscber

  • MD5

    d571f25c248e52c07a5343ceb7d9a4c2

  • SHA1

    7d00e4385dee328a7f486dc81ac8696a7d9e535b

  • SHA256

    0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b

  • SHA512

    983fbac794e65d1f391dcff37ddca5f56b8ab221611bc823be08ff9bb5b249007b75e6d7e0c4e4edd09d5edc629d7d010a2e402422154ca800fb867788f825c9

  • SSDEEP

    98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBN:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBN

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b

    • Size

      4.0MB

    • MD5

      d571f25c248e52c07a5343ceb7d9a4c2

    • SHA1

      7d00e4385dee328a7f486dc81ac8696a7d9e535b

    • SHA256

      0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b

    • SHA512

      983fbac794e65d1f391dcff37ddca5f56b8ab221611bc823be08ff9bb5b249007b75e6d7e0c4e4edd09d5edc629d7d010a2e402422154ca800fb867788f825c9

    • SSDEEP

      98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBN:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBN

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks