General
-
Target
PayJoy.apk
-
Size
5.9MB
-
Sample
230202-hjc2jafd29
-
MD5
23eba8c0077e1246762caeec3420848e
-
SHA1
589663fbc2bd17171e42a83b96f0e28b9e80f2db
-
SHA256
5f81322a2035ab07f973aff41cdebc0b34c7d2a4dc6472374318c09d3abfde22
-
SHA512
f70c750e0a04f21582c5137b47905a92fd2658dcc3ba0238ae1d85478762285a9cfabe747c785a2c2923a78a940a11fadbb9137aa83046c9f1cec0a2f9edf600
-
SSDEEP
98304:gTcnWjXJ5tC2zDrhJo+S6Wg8fmrgTVt7HRf0MKUP1Uq2AQn2ofra8ZEjb:jWN22zDrZV8fmr4R6KUq2TuP
Static task
static1
Behavioral task
behavioral1
Sample
PayJoy.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
PayJoy.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
PayJoy.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
PayJoy.apk
-
Size
5.9MB
-
MD5
23eba8c0077e1246762caeec3420848e
-
SHA1
589663fbc2bd17171e42a83b96f0e28b9e80f2db
-
SHA256
5f81322a2035ab07f973aff41cdebc0b34c7d2a4dc6472374318c09d3abfde22
-
SHA512
f70c750e0a04f21582c5137b47905a92fd2658dcc3ba0238ae1d85478762285a9cfabe747c785a2c2923a78a940a11fadbb9137aa83046c9f1cec0a2f9edf600
-
SSDEEP
98304:gTcnWjXJ5tC2zDrhJo+S6Wg8fmrgTVt7HRf0MKUP1Uq2AQn2ofra8ZEjb:jWN22zDrZV8fmr4R6KUq2TuP
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-