General

  • Target

    0EE19BCC2B664AA10892F8E0A0AAEF9E37FFA4F8F9CBAE03C5CD1CA2406FB42F.apk

  • Size

    29.3MB

  • Sample

    220715-qaxnksaff3

  • MD5

    37a3e8b3d977a930214ec10f6a793537

  • SHA1

    b31dde48fcbc6b02c28c4cbebb3cdf8014d0d5ef

  • SHA256

    0ee19bcc2b664aa10892f8e0a0aaef9e37ffa4f8f9cbae03c5cd1ca2406fb42f

  • SHA512

    9250357f552769322ecb0c76f491c3804e24c7d3cdf05d63957a9ec6a303cdc1320eb4acc790cb3aae9088abbe713abc62e3bd64f0866ee689a0bdc7063671cd

Malware Config

Targets

    • Target

      0EE19BCC2B664AA10892F8E0A0AAEF9E37FFA4F8F9CBAE03C5CD1CA2406FB42F.apk

    • Size

      29.3MB

    • MD5

      37a3e8b3d977a930214ec10f6a793537

    • SHA1

      b31dde48fcbc6b02c28c4cbebb3cdf8014d0d5ef

    • SHA256

      0ee19bcc2b664aa10892f8e0a0aaef9e37ffa4f8f9cbae03c5cd1ca2406fb42f

    • SHA512

      9250357f552769322ecb0c76f491c3804e24c7d3cdf05d63957a9ec6a303cdc1320eb4acc790cb3aae9088abbe713abc62e3bd64f0866ee689a0bdc7063671cd

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks