General
-
Target
Chat Stickers_1.0.apk
-
Size
8.0MB
-
Sample
220606-nbz4zscabj
-
MD5
91f7d5ca0fa7dbdff8492556e46e6493
-
SHA1
fa6c99e25674712fd98596618df73f77651a26dc
-
SHA256
e163bee7c61de45894ecb888cf5811176115903a8754841462d75b5970f5535b
-
SHA512
c372b951cd6b7bb76bdd5281e38a1562376f24e8a664913e1ad15236177d3e634d0a58b4bbb08100750f2ed2e7d7e6d1f5483bb95557987fe3070b11ff2ea33b
Static task
static1
Behavioral task
behavioral1
Sample
Chat Stickers_1.0.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
Chat Stickers_1.0.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Extracted
joker
https://xjuys.oss-accelerate.aliyuncs.com
https://beside.oss-eu-west-1.aliyuncs.com
Targets
-
-
Target
Chat Stickers_1.0.apk
-
Size
8.0MB
-
MD5
91f7d5ca0fa7dbdff8492556e46e6493
-
SHA1
fa6c99e25674712fd98596618df73f77651a26dc
-
SHA256
e163bee7c61de45894ecb888cf5811176115903a8754841462d75b5970f5535b
-
SHA512
c372b951cd6b7bb76bdd5281e38a1562376f24e8a664913e1ad15236177d3e634d0a58b4bbb08100750f2ed2e7d7e6d1f5483bb95557987fe3070b11ff2ea33b
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-