General

  • Target

    802d02aa5c525764560bc087176d0845de687800c29ed6b8ab4075fb2fb9f86b

  • Size

    2.9MB

  • Sample

    221029-bref1aehh5

  • MD5

    c05f9f103f5fa985d26e81be857636d9

  • SHA1

    4f36881b7b98039485fc867f0913635c2eeced6a

  • SHA256

    802d02aa5c525764560bc087176d0845de687800c29ed6b8ab4075fb2fb9f86b

  • SHA512

    42288a37a3ba209de5fd10a872c69ddb0972987cabaf103c730cc80e20d20eea32c1d9e2efeee53a1c0f9f6c0ffd0a82dc8dcf52c1162f832954df5054cdb5cb

  • SSDEEP

    49152:ZB22tsLQh9j/v1An8G1ttkj2ensxwHaglpdDu0vfkeNIhrw/5ua+yedmRW:ZZt+Qj1A7z2WMaY4wVww/ZRW

Malware Config

Extracted

Family

joker

C2

http://qqydw.oss-cn-beijing.aliyuncs.com

Targets

    • Target

      802d02aa5c525764560bc087176d0845de687800c29ed6b8ab4075fb2fb9f86b

    • Size

      2.9MB

    • MD5

      c05f9f103f5fa985d26e81be857636d9

    • SHA1

      4f36881b7b98039485fc867f0913635c2eeced6a

    • SHA256

      802d02aa5c525764560bc087176d0845de687800c29ed6b8ab4075fb2fb9f86b

    • SHA512

      42288a37a3ba209de5fd10a872c69ddb0972987cabaf103c730cc80e20d20eea32c1d9e2efeee53a1c0f9f6c0ffd0a82dc8dcf52c1162f832954df5054cdb5cb

    • SSDEEP

      49152:ZB22tsLQh9j/v1An8G1ttkj2ensxwHaglpdDu0vfkeNIhrw/5ua+yedmRW:ZZt+Qj1A7z2WMaY4wVww/ZRW

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix

Tasks