General

  • Target

    176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f

  • Size

    4.0MB

  • Sample

    221109-y7wrjsdegq

  • MD5

    6481509a5d3a32abdef685297980f7d8

  • SHA1

    b9abfb0457909be6ff5ba2facddfd2c185f862c0

  • SHA256

    176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f

  • SHA512

    2bb86030b6e832d0c2627029f4d9d42d40efdafba4452a1420b88fa888c8472d42bba07d87f2c22a45980da51e9bd1062a0c826a31ac7eff12d14b88f2747d0f

  • SSDEEP

    98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBE:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBE

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f

    • Size

      4.0MB

    • MD5

      6481509a5d3a32abdef685297980f7d8

    • SHA1

      b9abfb0457909be6ff5ba2facddfd2c185f862c0

    • SHA256

      176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f

    • SHA512

      2bb86030b6e832d0c2627029f4d9d42d40efdafba4452a1420b88fa888c8472d42bba07d87f2c22a45980da51e9bd1062a0c826a31ac7eff12d14b88f2747d0f

    • SSDEEP

      98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBE:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBE

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks