Analysis

  • max time kernel
    2485942s
  • max time network
    151s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    20-12-2023 10:45

General

  • Target

    downjoy.apk

  • Size

    10.1MB

  • MD5

    6a042858aaaebdb76129ce5c83d158b9

  • SHA1

    3f9d6fd17b0adc017b90ffb0f34b41be1654f1ca

  • SHA256

    7d1124f77f0907e5d8aa8e02e7e4cbaab3fcfe4df65dbe557bcc66a08e73bd43

  • SHA512

    05b335b7c8adcb78db984fae470ce65761a60ff4f1c32dc51659db7eda2aa5ed96435e8943c0a32b2995055bae23af89bc92df047e6fb845a666e2dae61f9bc2

  • SSDEEP

    196608:OBQQiLvEOh8RC9cdN8zWlqey1E3Um+JIfXNwlb10PHsBqMhLCHvlcIGiTc4RRxgA:2QQeEOh0N8zeqP1E3mmfOlb1ljhdoTh7

Score
7/10

Malware Config

Signatures

  • Checks known Qemu files. 2 IoCs

    Checks for known Qemu files that exist on Android virtual device images.

  • Checks known Qemu pipes. 2 IoCs

    Checks for known pipes used by the Android emulator to communicate with the host.

  • Queries the unique device ID (IMEI, MEID, IMSI)
  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.downjoyimpl
    1⤵
    • Checks known Qemu files.
    • Checks known Qemu pipes.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4993

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/downjoy/SDK3.1/key.downjoy

    Filesize

    36B

    MD5

    ae5e912209d4817d42276864563b2af5

    SHA1

    db1d50396ec8fc3e62799ffb1192ae0f7c6e5893

    SHA256

    5a2c2c46b8dbf633274e48473f3ccc94ed341e02be4d1ae7182f8d28f48461af

    SHA512

    99f436bd27ad345e85c247b39595e258ba582039e5e8f6dbb9e519ccc718e8dd4d46c5e8f7c72bfef17dae2842b375e85df1c5499f604ec181bade42ebc768bf