General

  • Target

    B34CFEEC76B6359E849F92003E2DF6D756A46A2C73EA4C334BECB7B53BD9EAA8.apk

  • Size

    14.1MB

  • Sample

    220715-qacneabggl

  • MD5

    a6c412c2e266039f2d4a8096b7013f77

  • SHA1

    6a206b4c26f3a2ed1c4ca494a81f18577e68456e

  • SHA256

    b34cfeec76b6359e849f92003e2df6d756a46a2c73ea4c334becb7b53bd9eaa8

  • SHA512

    0096e8950b2633c8bd8133fbc11ad93af72426da55e03159793d881d3746f8212cd5cc74ad4ca3a36e64618ae90c401add350194af85accdd9d9fed83421a509

Malware Config

Targets

    • Target

      B34CFEEC76B6359E849F92003E2DF6D756A46A2C73EA4C334BECB7B53BD9EAA8.apk

    • Size

      14.1MB

    • MD5

      a6c412c2e266039f2d4a8096b7013f77

    • SHA1

      6a206b4c26f3a2ed1c4ca494a81f18577e68456e

    • SHA256

      b34cfeec76b6359e849f92003e2df6d756a46a2c73ea4c334becb7b53bd9eaa8

    • SHA512

      0096e8950b2633c8bd8133fbc11ad93af72426da55e03159793d881d3746f8212cd5cc74ad4ca3a36e64618ae90c401add350194af85accdd9d9fed83421a509

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks