General

  • Target

    f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7

  • Size

    29.1MB

  • Sample

    220717-szjjcsdbh4

  • MD5

    339359eb1f92baeda3d7851007021a1d

  • SHA1

    ebd3a9e760e74fbfb7c333ac4ce0ef8ae557e51b

  • SHA256

    f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7

  • SHA512

    b601b5a4956e1e329e40840cfe36c714df6833be5890c6ec5d02039f55eb92826cf27c75204eded069750e9412ba59383e8ecbff706e7bb0a5875dac3de383e9

Score
10/10

Malware Config

Extracted

Family

joker

C2

http://foodfighter.oss-cn-hangzhou.aliyuncs.com

Targets

    • Target

      f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7

    • Size

      29.1MB

    • MD5

      339359eb1f92baeda3d7851007021a1d

    • SHA1

      ebd3a9e760e74fbfb7c333ac4ce0ef8ae557e51b

    • SHA256

      f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7

    • SHA512

      b601b5a4956e1e329e40840cfe36c714df6833be5890c6ec5d02039f55eb92826cf27c75204eded069750e9412ba59383e8ecbff706e7bb0a5875dac3de383e9

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks