General
-
Target
1752a41c3f8dd77b23548c496cc28457d6a61fe1903d2373a00e25d38127e15e
-
Size
26KB
-
Sample
221108-wzqt8adbcl
-
MD5
00f2c96ac54135d64b1fe38deb21c6d0
-
SHA1
6113c855657bf685fe54ef198f62c6cf77bfa085
-
SHA256
1752a41c3f8dd77b23548c496cc28457d6a61fe1903d2373a00e25d38127e15e
-
SHA512
6f5e7d53faa9574952274aebc74c5deb9c14256b0a449504212d94b2574db015bcd4811034d341cef06b643f7b921bb768e7ab7155e92af5a41339683f70a979
-
SSDEEP
384:r65Iu0DOSiBuMAjo/BNxf+yOhmwnh2Ij0eohDTkVOhvF27z/FUxiWtBlwmRz:r65JAyg9oNVo2IC9yoYf
Behavioral task
behavioral1
Sample
1752a41c3f8dd77b23548c496cc28457d6a61fe1903d2373a00e25d38127e15e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1752a41c3f8dd77b23548c496cc28457d6a61fe1903d2373a00e25d38127e15e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
joker
http://mmtie.oss-cn-hangzhou.aliyuncs.com
Targets
-
-
Target
1752a41c3f8dd77b23548c496cc28457d6a61fe1903d2373a00e25d38127e15e
-
Size
26KB
-
MD5
00f2c96ac54135d64b1fe38deb21c6d0
-
SHA1
6113c855657bf685fe54ef198f62c6cf77bfa085
-
SHA256
1752a41c3f8dd77b23548c496cc28457d6a61fe1903d2373a00e25d38127e15e
-
SHA512
6f5e7d53faa9574952274aebc74c5deb9c14256b0a449504212d94b2574db015bcd4811034d341cef06b643f7b921bb768e7ab7155e92af5a41339683f70a979
-
SSDEEP
384:r65Iu0DOSiBuMAjo/BNxf+yOhmwnh2Ij0eohDTkVOhvF27z/FUxiWtBlwmRz:r65JAyg9oNVo2IC9yoYf
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Registers COM server for autorun
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-