General

  • Target

    837a8108fef980f0e2889ae1bc98b0f655bb1dd5d08436b5ba7676c2f13f4209

  • Size

    18.7MB

  • Sample

    231220-ewf26sbfan

  • MD5

    227a1945cb031d32e880e57a6c60a493

  • SHA1

    3dfc10f67da86d6cea89f08b4dfbb6134ce403e9

  • SHA256

    837a8108fef980f0e2889ae1bc98b0f655bb1dd5d08436b5ba7676c2f13f4209

  • SHA512

    a278467565f2c20b5792bd9ed2d035cd2cac35a7b85fe0a12f1af5d76011c7a61d5e2277e92eca661c273d4fdef6374f9c4cc46dbb603fdb98c29e677f8bef8d

  • SSDEEP

    393216:qzsrl6+FK34h8qCtobzzgcadx4zwW5X+usaodgrY4hgTj2JJU:7cS/5C8vgcav4EW5JSAgTj2JJU

Malware Config

Extracted

Family

joker

C2

https://xjuys.oss-accelerate.aliyuncs.com/xjuys

http://139.177.180.78/hell

https://beside.oss-eu-west-1.aliyuncs.com/af2

https://xjuys.oss-accelerate.aliyuncs.com/fbhx

Targets

    • Target

      837a8108fef980f0e2889ae1bc98b0f655bb1dd5d08436b5ba7676c2f13f4209

    • Size

      18.7MB

    • MD5

      227a1945cb031d32e880e57a6c60a493

    • SHA1

      3dfc10f67da86d6cea89f08b4dfbb6134ce403e9

    • SHA256

      837a8108fef980f0e2889ae1bc98b0f655bb1dd5d08436b5ba7676c2f13f4209

    • SHA512

      a278467565f2c20b5792bd9ed2d035cd2cac35a7b85fe0a12f1af5d76011c7a61d5e2277e92eca661c273d4fdef6374f9c4cc46dbb603fdb98c29e677f8bef8d

    • SSDEEP

      393216:qzsrl6+FK34h8qCtobzzgcadx4zwW5X+usaodgrY4hgTj2JJU:7cS/5C8vgcav4EW5JSAgTj2JJU

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks