Analysis
-
max time kernel
3019266s -
max time network
18s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
26-11-2022 00:58
Static task
static1
Behavioral task
behavioral1
Sample
ed754a63e1c8ad63384d6cbcc85f0ad6b0e039c8c9ac7769722087e499a652ca.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
ed754a63e1c8ad63384d6cbcc85f0ad6b0e039c8c9ac7769722087e499a652ca.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
ed754a63e1c8ad63384d6cbcc85f0ad6b0e039c8c9ac7769722087e499a652ca.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
ed754a63e1c8ad63384d6cbcc85f0ad6b0e039c8c9ac7769722087e499a652ca.apk
-
Size
1.4MB
-
MD5
c596e6094b0236f6a270e2e39eb55724
-
SHA1
d226c1dd3cc0e8ff179d82a3b7c9263cd36afe5c
-
SHA256
ed754a63e1c8ad63384d6cbcc85f0ad6b0e039c8c9ac7769722087e499a652ca
-
SHA512
54b26054fa26d3b2eba27cb306fbf536f46b7b2f949ff5935c49e1f90d41917baada2cf463f28f952e5aa9e335ffd5abad23802136a78fa32c0acfc89e820f63
-
SSDEEP
24576:6MKw3tSc+GSH0fvjcUrP1WkkH31LfVaT+//fq8a6RkxJ0laKdzOcsG/:6MD3scnSGvQO0k6lTVy+//fqykxJcdq6
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cljr.kwtn.vjvqioc pid process /data/user/0/com.cljr.kwtn.vjvq/app_tjc/joy.jar 4591 com.cljr.kwtn.vjvq -
Requests dangerous framework permissions 9 IoCs
Processes:
description ioc Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to monitor incoming MMS messages. android.permission.RECEIVE_MMS Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.cljr.kwtn.vjvqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.cljr.kwtn.vjvq
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.cljr.kwtn.vjvq/app_tjc/djoy.jarFilesize
66KB
MD575ba605bcfe18a0b5f3f6f883f25d423
SHA1387cbab78be74a9a98d66f622f5d17d808af7163
SHA2560ade33f2144d84999286e47a59693634482f23ad028c1ed408963a843f9bca44
SHA512b3d43728f4c91f3422ff9b120e2669d4b9ab13bb85c538b5d0ae342073577ec671255221165592efd674dc8e6cc10fde0dd7b1fe680e41c37a5d35572ad5bf5e
-
/data/user/0/com.cljr.kwtn.vjvq/app_tjc/joy.jarFilesize
135KB
MD5b6dfe0e23cf40553349b3df37d5be11a
SHA1ac89b62afbd460f9aeb8a708dbf36df7f756c1ad
SHA256c67629746eb7eb4203a24e4843c824ff0e7eefd3905003f2790ce90c08dfaa29
SHA5121c944593a77d1af298e6fd8e9641958cb75c15c9ec697d3d72d1e9a0bf7c32529c50808a185fea9292af532d1c04dc688b32f37dea3f1a8cd16402d19b1b78be
-
/data/user/0/com.cljr.kwtn.vjvq/app_tjc/oat/joy.jar.cur.profMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.cljr.kwtn.vjvq/app_tjc/tjoy.jarFilesize
66KB
MD5a583245803ebb7c627f6c5afe73dea3d
SHA18e0d18478a5230bf537580181abbbf80d81c65b9
SHA256764b3505b93a104a1dc63b041d0256f8fccf8de928de562b112aa0807830bf80
SHA512ed2dc92f657a0fb7ba68034d0504e7f0afb325b765c4dfa522918d65ffe126e058dfea1b910410c5f334e8aad17eadcf28ba4fff04067148eaf1195dd1a2ddf6
-
/data/user/0/com.cljr.kwtn.vjvq/shared_prefs/joyssp.xmlFilesize
303B
MD5d8de6910c0a6ae11c4a4a4bc31bd5314
SHA180a239b266d52073873f4f2b450f0e3b20ff6622
SHA2569894f6ac814212a02218e4448db53c3d4fc0a8f0a8936e2bf6e5464638fb47a9
SHA512a210bf5c796e9b5addfbb363ba3a636e7b29f3fd5d640a3c852ad0aa5528fc1b5da68eb3732a14191a1b9149940df0872781fd157bb22d42f50a8ec9541c5267
-
/storage/emulated/0/.cache/apk02Filesize
1.1MB
MD553a159854b055e2c003da988896bcc90
SHA1d3a1382bc1cc66c94f14a0ec9c6f0597162b935c
SHA25645f94fcbf8678ef835d6dc4f8afa7cb613d49c1e6bde249e54134c87ba93627f
SHA512ab0bf624dd776e3ccac8160e7714d4437bc22e84eeb0710424a30f663eda239bffdf44b2f6f08fac49b2030ad013ebf5e81c6b9d279e99c7519d38390ff55468
-
/storage/emulated/0/.cache/youla1102.apkFilesize
1.1MB
MD53ee5a13c106274cef3aee8db80de703c
SHA104d31b65a0a94aecc34ab3d36c0fad072c4e2096
SHA256751272949b1b6b7363e4fa9ef0914019ef729eca107c3d9b07e89a9f38b1f129
SHA51208db62aee5fbfc96f77cd4faca011d343b064341c38f96d70a5a03314c38712aa80a9e7fcb0bad0f0ee2214b650adbcd3faf3d92adf4276b6b5b61f844104a45