General

  • Target

    2cb26667f8f20ff642fbd2be4b936d32_JaffaCakes118

  • Size

    2.5MB

  • Sample

    240510-by7q5aed47

  • MD5

    2cb26667f8f20ff642fbd2be4b936d32

  • SHA1

    323086c2bfcd6685a877e367b56723de3b7376fd

  • SHA256

    33509b8a70788bf8eccfce51d921f5e997777e163d0dcf8ea84638759c964d28

  • SHA512

    8b36f197fe688a820b328ea7b0cf6d7aef07b551a7733a21ce190cc10f1e319ecae65c5c90e313a9e6cdafab05bff81219cd0414c55527ee765a1228e887c939

  • SSDEEP

    49152:7byoM0s4D/QoYEqiQeNR91qSFfHKdab4oEYGgD1GNEHO+/FeW9j49dOB:a30L/QZZiQeznNFi4Udgj/dL9j4POB

Malware Config

Extracted

Family

joker

C2

http://120.78.31.198:8030/api

http://121.41.88.125:7070/

http://47.97.211.44:18888/idlecode/

http://data1011.doulaiwen.com:9841/mvideo/

Targets

    • Target

      2cb26667f8f20ff642fbd2be4b936d32_JaffaCakes118

    • Size

      2.5MB

    • MD5

      2cb26667f8f20ff642fbd2be4b936d32

    • SHA1

      323086c2bfcd6685a877e367b56723de3b7376fd

    • SHA256

      33509b8a70788bf8eccfce51d921f5e997777e163d0dcf8ea84638759c964d28

    • SHA512

      8b36f197fe688a820b328ea7b0cf6d7aef07b551a7733a21ce190cc10f1e319ecae65c5c90e313a9e6cdafab05bff81219cd0414c55527ee765a1228e887c939

    • SSDEEP

      49152:7byoM0s4D/QoYEqiQeNR91qSFfHKdab4oEYGgD1GNEHO+/FeW9j49dOB:a30L/QZZiQeznNFi4Udgj/dL9j4POB

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks