General
-
Target
Joyxoff-3.58.4.26.msi
-
Size
4.4MB
-
Sample
230315-22laeafg78
-
MD5
17f0fa5d17ab3287940c9df53d6b6706
-
SHA1
c7ace486c958e9ff40271644f3df84dbcd64c613
-
SHA256
3f2e02d54386fff0eed5385987d5d002c4930bee1988387908b7e917799a7099
-
SHA512
964caffa9079bd83c826afafaa56086fff45b9359339d9e3d488480d3d748a841832894888f80f4626f4c105507555c8db8af2f6efb2de328068edb2346a0f4b
-
SSDEEP
98304:PTj537fwoD59EAwxUwXgVwhVocvtZvwPEkeSNSDOS:Lj537fboAwxUwXEwHJyEpSNSSS
Static task
static1
Behavioral task
behavioral1
Sample
Joyxoff-3.58.4.26.msi
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
Joyxoff-3.58.4.26.msi
-
Size
4.4MB
-
MD5
17f0fa5d17ab3287940c9df53d6b6706
-
SHA1
c7ace486c958e9ff40271644f3df84dbcd64c613
-
SHA256
3f2e02d54386fff0eed5385987d5d002c4930bee1988387908b7e917799a7099
-
SHA512
964caffa9079bd83c826afafaa56086fff45b9359339d9e3d488480d3d748a841832894888f80f4626f4c105507555c8db8af2f6efb2de328068edb2346a0f4b
-
SSDEEP
98304:PTj537fwoD59EAwxUwXgVwhVocvtZvwPEkeSNSDOS:Lj537fboAwxUwXEwHJyEpSNSSS
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-