General

  • Target

    79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e

  • Size

    6.1MB

  • Sample

    220725-elr2paeaem

  • MD5

    3e22dddff9799e62965287d006d96476

  • SHA1

    01ad1fabb660881b12bca65fc810dddc362cce0b

  • SHA256

    79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e

  • SHA512

    032c16b1808e5961c99a569b4722cd1be2ce8735b8307f8a3b2d371ee7a2386c64ecc84180f736f17c8f42514270ff2d9d06f54aebcb87fbc9850ee489fae772

Score
10/10

Malware Config

Extracted

Family

joker

C2

http://ngsteamapk.oss-cn-hangzhou.aliyuncs.com

Targets

    • Target

      79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e

    • Size

      6.1MB

    • MD5

      3e22dddff9799e62965287d006d96476

    • SHA1

      01ad1fabb660881b12bca65fc810dddc362cce0b

    • SHA256

      79caa0f5edd46996d4c557730fc8d3fe86dad7d0f91bb5479ad0786c3166e50e

    • SHA512

      032c16b1808e5961c99a569b4722cd1be2ce8735b8307f8a3b2d371ee7a2386c64ecc84180f736f17c8f42514270ff2d9d06f54aebcb87fbc9850ee489fae772

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks