General

  • Target

    ff65b2c8def38b91397b5d647cdf67343e5ad5861384f1153a6f267420cc43d1

  • Size

    4.0MB

  • Sample

    221114-w6h3yshc4t

  • MD5

    c542d5094d71800d86229dd4ed139072

  • SHA1

    8018686b2fc9884e254b6d2606b8af946d6ae50d

  • SHA256

    ff65b2c8def38b91397b5d647cdf67343e5ad5861384f1153a6f267420cc43d1

  • SHA512

    9b3f479d5f939a584c6e1f553d79139549640b6fdc4b8dd1e0cb72c6f011ddf3563fc0e6826b47809649fcfd2679277a88cb96e706738d5b437e98e2c5fdd6b1

  • SSDEEP

    98304:WBLaX2XjPrbVGbFWMZNA2wITWuXIu/M1vrGp1oVXx:YLaWrh3WNVwWWuz/M1vqpeXx

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      ff65b2c8def38b91397b5d647cdf67343e5ad5861384f1153a6f267420cc43d1

    • Size

      4.0MB

    • MD5

      c542d5094d71800d86229dd4ed139072

    • SHA1

      8018686b2fc9884e254b6d2606b8af946d6ae50d

    • SHA256

      ff65b2c8def38b91397b5d647cdf67343e5ad5861384f1153a6f267420cc43d1

    • SHA512

      9b3f479d5f939a584c6e1f553d79139549640b6fdc4b8dd1e0cb72c6f011ddf3563fc0e6826b47809649fcfd2679277a88cb96e706738d5b437e98e2c5fdd6b1

    • SSDEEP

      98304:WBLaX2XjPrbVGbFWMZNA2wITWuXIu/M1vrGp1oVXx:YLaWrh3WNVwWWuz/M1vqpeXx

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks