Analysis
-
max time kernel
2265152s -
max time network
161s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
20-12-2023 00:10
Static task
static1
Behavioral task
behavioral1
Sample
724e412f02185c8721fea47187d07cfeac03a42b2e1d776f8fc7eccb5143289f.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
724e412f02185c8721fea47187d07cfeac03a42b2e1d776f8fc7eccb5143289f.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
724e412f02185c8721fea47187d07cfeac03a42b2e1d776f8fc7eccb5143289f.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
724e412f02185c8721fea47187d07cfeac03a42b2e1d776f8fc7eccb5143289f.apk
-
Size
6.4MB
-
MD5
1325ddc84a95033801f4043f260c8313
-
SHA1
9a63bec8f4602933b284729563249afb90eb0391
-
SHA256
724e412f02185c8721fea47187d07cfeac03a42b2e1d776f8fc7eccb5143289f
-
SHA512
a0aa271960cd3ad23eb7cc5fdd27d02b45f78ee2a7b58fa8380b3cb846c8c521b49c3852dc31e42d009b1ae35f8a186ed2e85cac2825527ff9fc7d9634b7aef9
-
SSDEEP
98304:0fArAqo/RtzwUsYSuBmy0d7DGZgoRimxf4jxH29LHZ4zLEcmuaHbTdDXy:0fAr1/uB7kaZHRdf4jY9L54zAcmJbTZy
Malware Config
Extracted
joker
https://homeward.oss-me-east-1.aliyuncs.com/nameplate
https://xjuys.oss-accelerate.aliyuncs.com/xjuys
http://139.177.180.78/hell
https://beside.oss-eu-west-1.aliyuncs.com/af2
https://xjuys.oss-accelerate.aliyuncs.com/fbhx
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Loads dropped Dex/Jar 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pdfview.reader.pdfscann/files/audience_network.dex 5121 com.pdfview.reader.pdfscann /data/user/0/com.pdfview.reader.pdfscann/files/audience_network.dex 5121 com.pdfview.reader.pdfscann /data/user/0/com.pdfview.reader.pdfscann/files/saudys 5121 com.pdfview.reader.pdfscann /data/user/0/com.pdfview.reader.pdfscann/files/journey 5121 com.pdfview.reader.pdfscann /data/user/0/com.pdfview.reader.pdfscann/files/Yang 5121 com.pdfview.reader.pdfscann -
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.pdfview.reader.pdfscann
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD531217fab7722f55e60245ac48a48560a
SHA1a8f33b9cfbb3858eefa45eb9ec23edacaf83b972
SHA25678bf941588cddb91fa62f11410c616c572508b341f505c704712faee0501a042
SHA5127d5be7c756f70dbf085b3332ae59f01ffdf3697bbe83de702231a920ab9304ef0f1502cebf42c1264c31dfe26663c2e7e762b41061650f9812388af14cb4b2a5
-
Filesize
401KB
MD5ed4830a2bed7fa5dc10d1df489abdb25
SHA1725ba183b3079649e3752ea08b8f19dfae841b3e
SHA2565b192a2193ce2c52b53dbb100387bc5bf81d8642828438a99293394f8be64c76
SHA512cd873ff87c995c6ef89edfe7ffebfc3d24eecc8935b547cc0bf21803ae2bc7067cdad03aaf9b3a873f6bc3f0d72c28053a918a8e57b68f7f7de5267b6330d48f
-
Filesize
6KB
MD59af052da1567a096350f9fc5d3629084
SHA12805050d51348f8584c0c5f95ea0aecb194632b0
SHA256c83385b0370b18b75ced66aa0803b878deab447d97bf3d7dfd3f1ac9d88f4186
SHA51231fb530718c7f0a79e6b19eaa9c5d6c19547ac8054f29231d5c963cc1c4b9d915a7c57a3a2caf30b33239817d066ccdd94bec857113b2a899773585e3cca3f39
-
Filesize
716B
MD5b7fa713e85ba64014e78cc3964e459c6
SHA10a0e2b1afb2429d6a3f4edd90435d2c392aef200
SHA256b2a8ec85d872896e26073b12ef214f89115b2804ef1d799f72d10b8878048eea
SHA5120e5cd33993f261d452be9b91eb90829666e1f66c050b6ac556fd479cce5921ec0a48ee4dde7f703788b57bd2569aadf909f26caad6057928bfc48260d60dfa8a
-
Filesize
3KB
MD543911fa1ce6a2a2ba7c45f36b6187faf
SHA14543ad7ed05726464af38d5f047ebaedcb0d5498
SHA256b4e67aa7674c1a439ce27c2a706a7c8ab2a6c7a0fdbb752781acec0d5413d851
SHA512d2ed6c04bc142672d2be8fe443e44990f5fa405e1a3b4496a9a3f09bee07fb2f40e0d70126965707d6934673f7ea9801c2a284482113b99c17127550aab96af3
-
Filesize
59KB
MD56039552d12f80cadba4f5380d2a6956e
SHA1f1d5e6526673b121b78f33dae74ce03e5c9ae75a
SHA25664968aff752918e06ef849e623c6fc601cff69b28a5499891408a58f421b5e27
SHA51255a7d9a0a421596ab16e66d0c490a224903954e7721bb28a43658f5e64695411021c0155a3ccbe11539ee24f02b0d1f72e1f42e1c7396a9f2ff9ed1da92c6d3c
-
Filesize
3.2MB
MD5692c6b1b89702297c59bd34c4bd1fa53
SHA1f38cac946f03d7e869018acbdfe0ed272e11b106
SHA256920e465a87a2409fc8d7186ea4e319c613c04d156bec75e8b91cb4d07b1deb75
SHA512927048402fb314ef2624776b27317a6f996ea6b3d697d66b8b213d5be9559f24ae0dca8d2f8a9350d32310b8cab071933936640641d297ba522b3af60424df63
-
Filesize
9KB
MD5c409d388c70ea8ad4fa9360865c761f9
SHA11def633ee910d31f50f9f415ae8768149c45dcee
SHA2562f0fe95c8a02ac85f9383cf7ef5d9937ac93cdc75d75c1f79dd48638ae2eeb1f
SHA512797d61aa6da7f15404fde84354b833253f9814113649f286162aa766753bf3ab5c678c5aa31805e7eebb6a457a5670e4c06e1ea0486636db464c71cb7c0a50ef
-
Filesize
5KB
MD51aa1f9493f5a62883d5512df3ee1c32c
SHA1d5f6599a22445575bb7b7e21958071d5c87cd170
SHA25662188b7f0f9f71a33356bcd9019822d4f4f1b077fd715c1236b9ab27598ec376
SHA51295ce0f1dc39c6309dd826abfe1f5f1f1aff374ce41ae50da12fe6f3d35da60babbc72da8bdb256dd7ab75830e0aeb4fe9e3b1a8ba42753d6f7e7a2e0b3428c12