General

  • Target

    Joker External - Free Fire-Cracked (1).exe

  • Size

    9.6MB

  • Sample

    241013-y6sy9s1dnm

  • MD5

    c118ec11be989392898985e81c5b82e3

  • SHA1

    2a1597cda802bb6f547ef95d5d95b83808b5bf31

  • SHA256

    7f08e34b8665bb38633a2df11439f76649b27f292d97f74337bf14674e6ba6a2

  • SHA512

    2708c46f833ddb6454c857e01495419268abf83a63c1d77846613ffc58197554217998583fe48f7d4cdf1609013346216531f875472dfd5020d09b0cdf19b74b

  • SSDEEP

    196608:EGg8VEdjHwy8G8Xu0UwfI9jUC2gYBYv3vbW4SEf+iITx1U6nS:28VEdj30IH2gYBgDWZjTnzS

Malware Config

Targets

    • Target

      Joker External - Free Fire-Cracked (1).exe

    • Size

      9.6MB

    • MD5

      c118ec11be989392898985e81c5b82e3

    • SHA1

      2a1597cda802bb6f547ef95d5d95b83808b5bf31

    • SHA256

      7f08e34b8665bb38633a2df11439f76649b27f292d97f74337bf14674e6ba6a2

    • SHA512

      2708c46f833ddb6454c857e01495419268abf83a63c1d77846613ffc58197554217998583fe48f7d4cdf1609013346216531f875472dfd5020d09b0cdf19b74b

    • SSDEEP

      196608:EGg8VEdjHwy8G8Xu0UwfI9jUC2gYBYv3vbW4SEf+iITx1U6nS:28VEdj30IH2gYBgDWZjTnzS

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks