MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 978b992afcdbdb7f25a22d88ec287d3a605020c07e6c5905f5681c9b4947c83b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Joker


Vendor detections: 4


Intelligence 4 IOCs YARA 6 File information Comments

SHA256 hash: 978b992afcdbdb7f25a22d88ec287d3a605020c07e6c5905f5681c9b4947c83b
SHA3-384 hash: 1b06d7ec5e3fb20e7818bb62df4a70a9be403c60e87aa1053ec16401ba7a602ad3550105671c8d3916e3422a480aff46
SHA1 hash: 22c6b7c04c1b0e8ff3d5e16c3405849cdd9a7310
MD5 hash: 6ffeeae4f08293c220e0454d311e5cb5
humanhash: connecticut-october-north-uniform
File name:com.colorful.joyeup.kboard_1.6.xapk
Download: download sample
Signature Joker
File size:29'330'219 bytes
First seen:2026-02-03 09:51:08 UTC
Last seen:Never
File type: xapk
MIME type:application/zip
ssdeep 393216:ScMrH0gnn81Dmq1b2rDNpseP+oyegkqYyAiOh4TasOpRGoX:ScwVXq16tpseW7YyAiOh4+5X
TLSH T14E571206F70CEC3BC9DA74389A974BD571166C81459093876925F618BFBB7C8CE2ABC0
TrID 48.2% (.JAR) Java Archive (13500/1/2)
37.5% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3)
14.2% (.ZIP) ZIP compressed archive (4000/1)
Magika jar
Reporter Anonymous
Tags:joker malware xapk

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
HK HK
Vendor Threat Intelligence
No detections
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
signed
Verdict:
Malicious
File Type:
zip
First seen:
2026-02-04T03:48:00Z UTC
Last seen:
2026-02-04T06:18:00Z UTC
Hits:
~10
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
android collection credential_access defense_evasion discovery execution impact persistence
Behaviour
Checks memory information
Registers a broadcast receiver at runtime (usually for listening for system events)
Schedules tasks to execute at a specified time
Checks the presence of a debugger
Queries information about active data network
Queries the mobile country code (MCC)
Reads information about phone network operator.
Checks Android system properties for emulator presence.
Obtains sensitive information copied to the device clipboard
Queries information about running processes on the device
Checks if the Android device is rooted.
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CHM_File_Executes_JS_Via_PowerShell
Author:daniyyell
Description:Detects a Microsoft Compiled HTML Help (CHM) file that executes embedded JavaScript to launch a messagebox via PowerShell
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments