General

  • Target

    545d92d97ffa8ddf77470a353a9a1f7b_JaffaCakes118

  • Size

    21.9MB

  • Sample

    240518-m5373agd2t

  • MD5

    545d92d97ffa8ddf77470a353a9a1f7b

  • SHA1

    0dce3f5d10c916f0273069e3f3ae8daa3f070b0a

  • SHA256

    6ac114369b8842227f533c83c3eaf71b59075b132e0f6325b105cda81a20da6e

  • SHA512

    088ec014f988ecb78cc05262f9c42c508e717997187332f2d51b931842bb8c2af7a56a1d5944c2a73858f1379896ca7f72632856d31fc9c910398beeacb557af

  • SSDEEP

    393216:BvG4g0IL9nGeNcH9vhvaUhVR66VRNmNsw27FIdduv8d5h64l5vmc9M5kqnVEW:B+4g0IL9nGeNcH9vhvaUhVRNHw27FDgO

Malware Config

Extracted

Family

joker

C2

http://ask.dcloud.net.cn/article/285

http://ofloc.map.baidu.com/offline_loc

http://wke.openspeech.cn/wakeup/

https://api.weibo.com/2/proxy/sdk/statistic.json

https://open.weixin.qq.com/connect/sdk/qrconnect?appid=%s&noncestr=%s&timestamp=%s&scope=%s&signature=%s

Targets

    • Target

      545d92d97ffa8ddf77470a353a9a1f7b_JaffaCakes118

    • Size

      21.9MB

    • MD5

      545d92d97ffa8ddf77470a353a9a1f7b

    • SHA1

      0dce3f5d10c916f0273069e3f3ae8daa3f070b0a

    • SHA256

      6ac114369b8842227f533c83c3eaf71b59075b132e0f6325b105cda81a20da6e

    • SHA512

      088ec014f988ecb78cc05262f9c42c508e717997187332f2d51b931842bb8c2af7a56a1d5944c2a73858f1379896ca7f72632856d31fc9c910398beeacb557af

    • SSDEEP

      393216:BvG4g0IL9nGeNcH9vhvaUhVR66VRNmNsw27FIdduv8d5h64l5vmc9M5kqnVEW:B+4g0IL9nGeNcH9vhvaUhVRNHw27FDgO

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks