General
-
Target
79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e
-
Size
6.1MB
-
Sample
220725-elr2paeaem
-
MD5
3e22dddff9799e62965287d006d96476
-
SHA1
01ad1fabb660881b12bca65fc810dddc362cce0b
-
SHA256
79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e
-
SHA512
032c16b1808e5961c99a569b4722cd1be2ce8735b8307f8a3b2d371ee7a2386c64ecc84180f736f17c8f42514270ff2d9d06f54aebcb87fbc9850ee489fae772
Behavioral task
behavioral1
Sample
79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
joker
http://ngsteamapk.oss-cn-hangzhou.aliyuncs.com
Targets
-
-
Target
79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e
-
Size
6.1MB
-
MD5
3e22dddff9799e62965287d006d96476
-
SHA1
01ad1fabb660881b12bca65fc810dddc362cce0b
-
SHA256
79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e
-
SHA512
032c16b1808e5961c99a569b4722cd1be2ce8735b8307f8a3b2d371ee7a2386c64ecc84180f736f17c8f42514270ff2d9d06f54aebcb87fbc9850ee489fae772
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-