General

  • Target

    Joyxoff-3.58.4.26.msi

  • Size

    4.4MB

  • Sample

    230315-22laeafg78

  • MD5

    17f0fa5d17ab3287940c9df53d6b6706

  • SHA1

    c7ace486c958e9ff40271644f3df84dbcd64c613

  • SHA256

    3f2e02d54386fff0eed5385987d5d002c4930bee1988387908b7e917799a7099

  • SHA512

    964caffa9079bd83c826afafaa56086fff45b9359339d9e3d488480d3d748a841832894888f80f4626f4c105507555c8db8af2f6efb2de328068edb2346a0f4b

  • SSDEEP

    98304:PTj537fwoD59EAwxUwXgVwhVocvtZvwPEkeSNSDOS:Lj537fboAwxUwXEwHJyEpSNSSS

Score
7/10

Malware Config

Targets

    • Target

      Joyxoff-3.58.4.26.msi

    • Size

      4.4MB

    • MD5

      17f0fa5d17ab3287940c9df53d6b6706

    • SHA1

      c7ace486c958e9ff40271644f3df84dbcd64c613

    • SHA256

      3f2e02d54386fff0eed5385987d5d002c4930bee1988387908b7e917799a7099

    • SHA512

      964caffa9079bd83c826afafaa56086fff45b9359339d9e3d488480d3d748a841832894888f80f4626f4c105507555c8db8af2f6efb2de328068edb2346a0f4b

    • SSDEEP

      98304:PTj537fwoD59EAwxUwXgVwhVocvtZvwPEkeSNSDOS:Lj537fboAwxUwXEwHJyEpSNSSS

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks