General
-
Target
f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7
-
Size
29.1MB
-
Sample
220717-szjjcsdbh4
-
MD5
339359eb1f92baeda3d7851007021a1d
-
SHA1
ebd3a9e760e74fbfb7c333ac4ce0ef8ae557e51b
-
SHA256
f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7
-
SHA512
b601b5a4956e1e329e40840cfe36c714df6833be5890c6ec5d02039f55eb92826cf27c75204eded069750e9412ba59383e8ecbff706e7bb0a5875dac3de383e9
Behavioral task
behavioral1
Sample
f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
joker
http://foodfighter.oss-cn-hangzhou.aliyuncs.com
Targets
-
-
Target
f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7
-
Size
29.1MB
-
MD5
339359eb1f92baeda3d7851007021a1d
-
SHA1
ebd3a9e760e74fbfb7c333ac4ce0ef8ae557e51b
-
SHA256
f9d5b5400ce0fe17e4a74af093ba051ad98b8eae5fb96087a89bef5c84817bf7
-
SHA512
b601b5a4956e1e329e40840cfe36c714df6833be5890c6ec5d02039f55eb92826cf27c75204eded069750e9412ba59383e8ecbff706e7bb0a5875dac3de383e9
Score7/10-
Checks Android system properties for emulator presence.
-
Uses Crypto APIs (Might try to encrypt user data).
-