General

  • Target

    3d8e72ca40cfdfb76ed970fb8a8fd50139fa046c2e2fb3913d4176dc2be423ae

  • Size

    3.2MB

  • Sample

    221001-zxt1msghaj

  • MD5

    c04b5f1ff4e8264c8895479b51fc8035

  • SHA1

    f0b3c925f8af96002382d83e2beb3b1778c239c4

  • SHA256

    3d8e72ca40cfdfb76ed970fb8a8fd50139fa046c2e2fb3913d4176dc2be423ae

  • SHA512

    b14a4f43732b9c6320b01b339e03726bc83294c47fa4c69aecadca881038951e1a437341145ef67bcc89b8007d352612f71987dd4b430eb058eda8320f52979c

  • SSDEEP

    49152:4LRY8qGnzXjbNXTSXLLt7zBxo1mwCmh2Kh2Rh2c9OK/2fFTx:CRYl+DXNXTSXLLt7zHzwSx2T

Malware Config

Extracted

Family

joker

C2

https://dzi-hy-jd.oss-cn-beijing.aliyuncs.com

Targets

    • Target

      3d8e72ca40cfdfb76ed970fb8a8fd50139fa046c2e2fb3913d4176dc2be423ae

    • Size

      3.2MB

    • MD5

      c04b5f1ff4e8264c8895479b51fc8035

    • SHA1

      f0b3c925f8af96002382d83e2beb3b1778c239c4

    • SHA256

      3d8e72ca40cfdfb76ed970fb8a8fd50139fa046c2e2fb3913d4176dc2be423ae

    • SHA512

      b14a4f43732b9c6320b01b339e03726bc83294c47fa4c69aecadca881038951e1a437341145ef67bcc89b8007d352612f71987dd4b430eb058eda8320f52979c

    • SSDEEP

      49152:4LRY8qGnzXjbNXTSXLLt7zBxo1mwCmh2Kh2Rh2c9OK/2fFTx:CRYl+DXNXTSXLLt7zHzwSx2T

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks