MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 afeb6efad25ed7bf1bc183c19ab5b59ccf799d46e620a5d1257d32669bedff6f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Joker


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: afeb6efad25ed7bf1bc183c19ab5b59ccf799d46e620a5d1257d32669bedff6f
SHA3-384 hash: 07d297f425db7390c88b4b751a0159cb49417ed56add9a5ee8bf8792f0075b6bbafcb980f5d08eaf0a60c766e8de0dee
SHA1 hash: a04ec47f1e9b82e6dcd16c963460a822afc09b7c
MD5 hash: 48e96501fd5be4de4bddf0f4c606c398
humanhash: don-north-three-vegan
File name:Emoji Design Keyboard.apk
Download: download sample
Signature Joker
File size:7'901'056 bytes
First seen:2022-06-19 14:56:00 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 196608:ifAr11tCO1K6Ehv2kX4jqBe5IL6w2XnfdSvEeydF:i4r8hhv2kCqBHL4Xnc8eq
TLSH T17D86125BE319A46FC4B79532897A122602574C564A83ABD33D1CB22C6FB3AC05F5DFC8
TrID 43.2% (.APK) Android Package (38500/1/9)
15.1% (.JAR) Java Archive (13500/1/2)
15.1% (.ZAN) BlueEyes Animation (13500/1/4)
11.7% (.SH3D) Sweet Home 3D design (generic) (10500/1/3)
8.9% (.XPI) Mozilla Firefox browser extension (8000/1/1)
Reporter 500mk500
Tags:apk joker signed

Code Signing Certificate

Organisation:Android
Issuer:Android
Algorithm:sha256WithRSAEncryption
Valid from:2022-06-11T10:11:21Z
Valid to:2052-06-11T10:11:21Z
Serial number: 2d957d204b2534143fcb1c54e99369de10c42983
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 0965c59999a6471b9d9bd84423b4a3163eff87f09e821d657dd014ed6c06c858
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
352
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Checks if app is currently debugged
Tries to detect Android x86
Behaviour
Behavior Graph:
n/a
Result
Malware family:
n/a
Score:
  7/10
Tags:
android evasion ransomware
Behaviour
Listens for changes in the sensor environment (might be used to detect emulation).
Removes a system notification.
Uses Crypto APIs (Might try to encrypt user data).
Reads information about phone network operator.
Loads dropped Dex/Jar
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Joker

apk afeb6efad25ed7bf1bc183c19ab5b59ccf799d46e620a5d1257d32669bedff6f

(this sample)

  
Dropping
Android Joker
  
Delivery method
Distributed via web download

Comments