General

  • Target

    3c7eec55d83a346b4f5f3f25dd9a56f5504a404f165db3fe4cb9717c7a166886

  • Size

    5.7MB

  • Sample

    230720-l5wbsafh3y

  • MD5

    c49f0aee218a72e7c3ec739b289cdfc1

  • SHA1

    affc5b85e9f4207e3fc7b9f4e0efc673036a80bc

  • SHA256

    3c7eec55d83a346b4f5f3f25dd9a56f5504a404f165db3fe4cb9717c7a166886

  • SHA512

    e28fff6b372f2f17ae47393784a51656f70377122f1c8dda24a1ab1a8a0db51bd4ef4321cf36da86dd7e590b60f0d435b6408e35b68036031ea505b19af63b27

  • SSDEEP

    98304:IL5PZO+uOdbQ2mTGtdlhygelQSDUvIe/EFYiztk9sY+r8htKvfDEGgQA5grh2Zr4:6QzkVmTGlZSYQe/YJ2WYO8hkvfDEGgQp

Malware Config

Extracted

Family

joker

C2

https://adcbk.oss-eu-central-1.aliyuncs.com/af2

Targets

    • Target

      3c7eec55d83a346b4f5f3f25dd9a56f5504a404f165db3fe4cb9717c7a166886

    • Size

      5.7MB

    • MD5

      c49f0aee218a72e7c3ec739b289cdfc1

    • SHA1

      affc5b85e9f4207e3fc7b9f4e0efc673036a80bc

    • SHA256

      3c7eec55d83a346b4f5f3f25dd9a56f5504a404f165db3fe4cb9717c7a166886

    • SHA512

      e28fff6b372f2f17ae47393784a51656f70377122f1c8dda24a1ab1a8a0db51bd4ef4321cf36da86dd7e590b60f0d435b6408e35b68036031ea505b19af63b27

    • SSDEEP

      98304:IL5PZO+uOdbQ2mTGtdlhygelQSDUvIe/EFYiztk9sY+r8htKvfDEGgQA5grh2Zr4:6QzkVmTGlZSYQe/YJ2WYO8hkvfDEGgQp

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks