Resubmissions

13-10-2024 21:06

241013-zxxrjaycne 10

13-10-2024 20:26

241013-y7zs7swhnf 10

General

  • Target

    JokerExternal-FreeFire-Cracked1.exe

  • Size

    9.6MB

  • Sample

    241013-y7zs7swhnf

  • MD5

    c118ec11be989392898985e81c5b82e3

  • SHA1

    2a1597cda802bb6f547ef95d5d95b83808b5bf31

  • SHA256

    7f08e34b8665bb38633a2df11439f76649b27f292d97f74337bf14674e6ba6a2

  • SHA512

    2708c46f833ddb6454c857e01495419268abf83a63c1d77846613ffc58197554217998583fe48f7d4cdf1609013346216531f875472dfd5020d09b0cdf19b74b

  • SSDEEP

    196608:EGg8VEdjHwy8G8Xu0UwfI9jUC2gYBYv3vbW4SEf+iITx1U6nS:28VEdj30IH2gYBgDWZjTnzS

Malware Config

Targets

    • Target

      JokerExternal-FreeFire-Cracked1.exe

    • Size

      9.6MB

    • MD5

      c118ec11be989392898985e81c5b82e3

    • SHA1

      2a1597cda802bb6f547ef95d5d95b83808b5bf31

    • SHA256

      7f08e34b8665bb38633a2df11439f76649b27f292d97f74337bf14674e6ba6a2

    • SHA512

      2708c46f833ddb6454c857e01495419268abf83a63c1d77846613ffc58197554217998583fe48f7d4cdf1609013346216531f875472dfd5020d09b0cdf19b74b

    • SSDEEP

      196608:EGg8VEdjHwy8G8Xu0UwfI9jUC2gYBYv3vbW4SEf+iITx1U6nS:28VEdj30IH2gYBgDWZjTnzS

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks