General

  • Target

    869c12efbd277144b37b161d76089b0264b6d8f9b7397e5a0757848e2a74e0d1

  • Size

    6.5MB

  • Sample

    231220-fwaqtsgcg6

  • MD5

    c585f9d1cf27bde20749b9b5c854f572

  • SHA1

    b83a3f3bce2cf444058e8493c8eb25394ca5ad46

  • SHA256

    869c12efbd277144b37b161d76089b0264b6d8f9b7397e5a0757848e2a74e0d1

  • SHA512

    1208bbeba9971696059ba52985ac1ce7e04b0e1cbef337ee21080d7dbeada7c40d22b01374c326d9e2e0f1abfcc5a2471ad899455b88646525886f73ffd3451c

  • SSDEEP

    98304:KqMwrdXx8Yf1lF6WROXbInGds8DikIlSBLk7ak3ElvwV/Wt6e22:KqMwRB8YJ6WRO3s8hIlSBLWEJUu122

Malware Config

Extracted

Family

joker

C2

https://joyjo.oss-us-east-1.aliyuncs.com/timestampcam

https://canbye.oss-accelerate.aliyuncs.com/canbye

https://canbye.oss-accelerate.aliyuncs.com/fbhx

Targets

    • Target

      869c12efbd277144b37b161d76089b0264b6d8f9b7397e5a0757848e2a74e0d1

    • Size

      6.5MB

    • MD5

      c585f9d1cf27bde20749b9b5c854f572

    • SHA1

      b83a3f3bce2cf444058e8493c8eb25394ca5ad46

    • SHA256

      869c12efbd277144b37b161d76089b0264b6d8f9b7397e5a0757848e2a74e0d1

    • SHA512

      1208bbeba9971696059ba52985ac1ce7e04b0e1cbef337ee21080d7dbeada7c40d22b01374c326d9e2e0f1abfcc5a2471ad899455b88646525886f73ffd3451c

    • SSDEEP

      98304:KqMwrdXx8Yf1lF6WROXbInGds8DikIlSBLk7ak3ElvwV/Wt6e22:KqMwRB8YJ6WRO3s8hIlSBLWEJUu122

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks