General
-
Target
com.journey.messagepro.apk
-
Size
9.3MB
-
Sample
221009-j29znaggaq
-
MD5
5b0f0ce4fb60900137fe0362855ef31c
-
SHA1
9f6174af2f5e4383065f72f5501b1b95aec9d584
-
SHA256
3c60195c997158215f2552a7f720570fd39a10eca1628152f601449db3eaeea4
-
SHA512
89267e15a7416b798c00423b0fafb0df804b5461221a29e0a908e73305e0928881f4acb95e57630086d1f1a31a7f268027a49be3d8510d8bbc79c488b441e34c
-
SSDEEP
196608:vSuz2uEU1juHCF7DZp3Zj4tQcOoV6VbPwt7sPJ34:v5BEU1juHgpJU5o9im34
Static task
static1
Behavioral task
behavioral1
Sample
com.journey.messagepro.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
com.journey.messagepro.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
com.journey.messagepro.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
joker
https://cxjus.oss-accelerate.aliyuncs.com
Targets
-
-
Target
com.journey.messagepro.apk
-
Size
9.3MB
-
MD5
5b0f0ce4fb60900137fe0362855ef31c
-
SHA1
9f6174af2f5e4383065f72f5501b1b95aec9d584
-
SHA256
3c60195c997158215f2552a7f720570fd39a10eca1628152f601449db3eaeea4
-
SHA512
89267e15a7416b798c00423b0fafb0df804b5461221a29e0a908e73305e0928881f4acb95e57630086d1f1a31a7f268027a49be3d8510d8bbc79c488b441e34c
-
SSDEEP
196608:vSuz2uEU1juHCF7DZp3Zj4tQcOoV6VbPwt7sPJ34:v5BEU1juHgpJU5o9im34
Score10/10-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-