General
-
Target
Joker External - Free Fire-Cracked (1).exe
-
Size
9.6MB
-
Sample
241013-y6sy9s1dnm
-
MD5
c118ec11be989392898985e81c5b82e3
-
SHA1
2a1597cda802bb6f547ef95d5d95b83808b5bf31
-
SHA256
7f08e34b8665bb38633a2df11439f76649b27f292d97f74337bf14674e6ba6a2
-
SHA512
2708c46f833ddb6454c857e01495419268abf83a63c1d77846613ffc58197554217998583fe48f7d4cdf1609013346216531f875472dfd5020d09b0cdf19b74b
-
SSDEEP
196608:EGg8VEdjHwy8G8Xu0UwfI9jUC2gYBYv3vbW4SEf+iITx1U6nS:28VEdj30IH2gYBgDWZjTnzS
Malware Config
Targets
-
-
Target
Joker External - Free Fire-Cracked (1).exe
-
Size
9.6MB
-
MD5
c118ec11be989392898985e81c5b82e3
-
SHA1
2a1597cda802bb6f547ef95d5d95b83808b5bf31
-
SHA256
7f08e34b8665bb38633a2df11439f76649b27f292d97f74337bf14674e6ba6a2
-
SHA512
2708c46f833ddb6454c857e01495419268abf83a63c1d77846613ffc58197554217998583fe48f7d4cdf1609013346216531f875472dfd5020d09b0cdf19b74b
-
SSDEEP
196608:EGg8VEdjHwy8G8Xu0UwfI9jUC2gYBYv3vbW4SEf+iITx1U6nS:28VEdj30IH2gYBgDWZjTnzS
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-