General

  • Target

    5c43210ab764676c792ca53153dfefab4172fd084c67e9497958ec38c5b004ed

  • Size

    4.0MB

  • Sample

    221109-1y9m6aecfk

  • MD5

    0abb92077bb88e701d7f5095e3cf7601

  • SHA1

    ab4d22eba9ced628254627f38b9a18f7115009d2

  • SHA256

    5c43210ab764676c792ca53153dfefab4172fd084c67e9497958ec38c5b004ed

  • SHA512

    4df199024794feb493948d7fe975190d42ee7b951772712e3821e908f6efd43b4ad06a1bd9836e0841537b804026bf87fadcbaf72e60a7220d8d3c6b767e5724

  • SSDEEP

    98304:tJgug67CrzpFObJV0ypLd6r+DxnSQpCtlbvV0TAYP/RIBaQFIlxW0i:fgQ72cE8tDxnDpEbvVwAe/GDOlri

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      5c43210ab764676c792ca53153dfefab4172fd084c67e9497958ec38c5b004ed

    • Size

      4.0MB

    • MD5

      0abb92077bb88e701d7f5095e3cf7601

    • SHA1

      ab4d22eba9ced628254627f38b9a18f7115009d2

    • SHA256

      5c43210ab764676c792ca53153dfefab4172fd084c67e9497958ec38c5b004ed

    • SHA512

      4df199024794feb493948d7fe975190d42ee7b951772712e3821e908f6efd43b4ad06a1bd9836e0841537b804026bf87fadcbaf72e60a7220d8d3c6b767e5724

    • SSDEEP

      98304:tJgug67CrzpFObJV0ypLd6r+DxnSQpCtlbvV0TAYP/RIBaQFIlxW0i:fgQ72cE8tDxnDpEbvVwAe/GDOlri

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks