General

  • Target

    com.journey.messagepro.apk

  • Size

    9.3MB

  • Sample

    221009-j29znaggaq

  • MD5

    5b0f0ce4fb60900137fe0362855ef31c

  • SHA1

    9f6174af2f5e4383065f72f5501b1b95aec9d584

  • SHA256

    3c60195c997158215f2552a7f720570fd39a10eca1628152f601449db3eaeea4

  • SHA512

    89267e15a7416b798c00423b0fafb0df804b5461221a29e0a908e73305e0928881f4acb95e57630086d1f1a31a7f268027a49be3d8510d8bbc79c488b441e34c

  • SSDEEP

    196608:vSuz2uEU1juHCF7DZp3Zj4tQcOoV6VbPwt7sPJ34:v5BEU1juHgpJU5o9im34

Malware Config

Extracted

Family

joker

C2

https://cxjus.oss-accelerate.aliyuncs.com

Targets

    • Target

      com.journey.messagepro.apk

    • Size

      9.3MB

    • MD5

      5b0f0ce4fb60900137fe0362855ef31c

    • SHA1

      9f6174af2f5e4383065f72f5501b1b95aec9d584

    • SHA256

      3c60195c997158215f2552a7f720570fd39a10eca1628152f601449db3eaeea4

    • SHA512

      89267e15a7416b798c00423b0fafb0df804b5461221a29e0a908e73305e0928881f4acb95e57630086d1f1a31a7f268027a49be3d8510d8bbc79c488b441e34c

    • SSDEEP

      196608:vSuz2uEU1juHCF7DZp3Zj4tQcOoV6VbPwt7sPJ34:v5BEU1juHgpJU5o9im34

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Checks Android system properties for emulator presence.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v6

Tasks