General
-
Target
Virusss yoker.apk
-
Size
6.4MB
-
Sample
240410-y7brdaaf65
-
MD5
1325ddc84a95033801f4043f260c8313
-
SHA1
9a63bec8f4602933b284729563249afb90eb0391
-
SHA256
724e412f02185c8721fea47187d07cfeac03a42b2e1d776f8fc7eccb5143289f
-
SHA512
a0aa271960cd3ad23eb7cc5fdd27d02b45f78ee2a7b58fa8380b3cb846c8c521b49c3852dc31e42d009b1ae35f8a186ed2e85cac2825527ff9fc7d9634b7aef9
-
SSDEEP
98304:0fArAqo/RtzwUsYSuBmy0d7DGZgoRimxf4jxH29LHZ4zLEcmuaHbTdDXy:0fAr1/uB7kaZHRdf4jY9L54zAcmJbTZy
Static task
static1
Behavioral task
behavioral1
Sample
Virusss yoker.apk
Resource
android-x64-20240221-en
Malware Config
Extracted
joker
https://homeward.oss-me-east-1.aliyuncs.com/nameplate
https://xjuys.oss-accelerate.aliyuncs.com/xjuys
http://139.177.180.78/hell
https://beside.oss-eu-west-1.aliyuncs.com/af2
https://xjuys.oss-accelerate.aliyuncs.com/fbhx
Targets
-
-
Target
Virusss yoker.apk
-
Size
6.4MB
-
MD5
1325ddc84a95033801f4043f260c8313
-
SHA1
9a63bec8f4602933b284729563249afb90eb0391
-
SHA256
724e412f02185c8721fea47187d07cfeac03a42b2e1d776f8fc7eccb5143289f
-
SHA512
a0aa271960cd3ad23eb7cc5fdd27d02b45f78ee2a7b58fa8380b3cb846c8c521b49c3852dc31e42d009b1ae35f8a186ed2e85cac2825527ff9fc7d9634b7aef9
-
SSDEEP
98304:0fArAqo/RtzwUsYSuBmy0d7DGZgoRimxf4jxH29LHZ4zLEcmuaHbTdDXy:0fAr1/uB7kaZHRdf4jY9L54zAcmJbTZy
Score10/10-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-