General

  • Target

    com.image.text.burkscanner.apk

  • Size

    15.6MB

  • Sample

    220811-h8ddlacdck

  • MD5

    36a37c3780056f41b09db8032906c338

  • SHA1

    bbb2b56df892e468a01149b2f98dbeba3275444c

  • SHA256

    e5a584d21ca765521d049416e3bf226e6b4fe927eb3bbb22882b6387e19a470a

  • SHA512

    aa4702cd85354e5fb3a439ef025c4bc35ac39bd04c17bfb503d8037dfd9eddaad95c50c5c4dca578d1168bd2fe468c69fce2325520581b5957b9cb270b65c5cf

Malware Config

Targets

    • Target

      com.image.text.burkscanner.apk

    • Size

      15.6MB

    • MD5

      36a37c3780056f41b09db8032906c338

    • SHA1

      bbb2b56df892e468a01149b2f98dbeba3275444c

    • SHA256

      e5a584d21ca765521d049416e3bf226e6b4fe927eb3bbb22882b6387e19a470a

    • SHA512

      aa4702cd85354e5fb3a439ef025c4bc35ac39bd04c17bfb503d8037dfd9eddaad95c50c5c4dca578d1168bd2fe468c69fce2325520581b5957b9cb270b65c5cf

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks