General

  • Target

    a4887d5734e90ef773b20a6f22cbca190ec76b5f4c00060f6cdb980c91308783

  • Size

    13.4MB

  • Sample

    231026-q5bdtsdg96

  • MD5

    c28d628b559e9f5f354e7f38137c5b4e

  • SHA1

    6cb8d769c8a8e7a8aa615d631e38be06a2e0c2c1

  • SHA256

    a4887d5734e90ef773b20a6f22cbca190ec76b5f4c00060f6cdb980c91308783

  • SHA512

    ef7f9ef9a42f2faa32d32af4dbf67e92c33b3f3149cad177b1dff872e12b35287847d15e65696b3c345ece5414a8d76eed13f6262e08ab3a77bd47fd0023755a

  • SSDEEP

    393216:s9o6d2bGntbD+ao+Naxzmclxd+RYkD0OKTfeGa:Z6dAGtPzo+Em0YRYmy0

Malware Config

Extracted

Family

joker

C2

https://weco2.oss-me-east-1.aliyuncs.com/smiple_4yue

Targets

    • Target

      a4887d5734e90ef773b20a6f22cbca190ec76b5f4c00060f6cdb980c91308783

    • Size

      13.4MB

    • MD5

      c28d628b559e9f5f354e7f38137c5b4e

    • SHA1

      6cb8d769c8a8e7a8aa615d631e38be06a2e0c2c1

    • SHA256

      a4887d5734e90ef773b20a6f22cbca190ec76b5f4c00060f6cdb980c91308783

    • SHA512

      ef7f9ef9a42f2faa32d32af4dbf67e92c33b3f3149cad177b1dff872e12b35287847d15e65696b3c345ece5414a8d76eed13f6262e08ab3a77bd47fd0023755a

    • SSDEEP

      393216:s9o6d2bGntbD+ao+Naxzmclxd+RYkD0OKTfeGa:Z6dAGtPzo+Em0YRYmy0

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks