{"id":89557,"date":"2021-01-22T20:08:06","date_gmt":"2021-01-22T14:38:06","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89557"},"modified":"2023-06-20T16:49:11","modified_gmt":"2023-06-20T11:19:11","slug":"stay-alert-joker-still-making-its-way-on-google-play-store","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/stay-alert-joker-still-making-its-way-on-google-play-store\/","title":{"rendered":"Stay Alert, Joker still making its way on Google Play Store!"},"content":{"rendered":"<p>We recently came across 2 malicious Joker family malware applications on Google Play Store\u00a0 \u2014 the company was quick to remove these <a href=\"https:\/\/blogs.quickheal.com\/quick-heal-reports-29-malicious-apps-10-million-downloads-google-play-store\/\">malicious applications<\/a> from their store based on our report. These two applications, namely \u201c<strong>Easy QR Scanner<\/strong>\u201d and \u201c<strong>Free Translator<\/strong>\u201d have more than 10k installs each.<\/p>\n<figure id=\"attachment_89560\" aria-describedby=\"caption-attachment-89560\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89560\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_1-1-650x94.png\" alt=\"Fig.1 Application icons\" width=\"650\" height=\"94\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_1-1-650x94.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_1-1-300x43.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_1-1-768x111.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_1-1-789x114.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_1-1.png 814w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89560\" class=\"wp-caption-text\">Fig.1 Application icons<\/figcaption><\/figure>\n<h2><strong>What is Joker Malware? <\/strong><\/h2>\n<p>Joker is spyware which steals the victim\u2019s SMS messages, contact list and the device info. It silently interacts with advertisement websites and subscribes the victim to premium services without their knowledge. The name \u201cJoker\u201d is taken from one of the C&amp;C domains of earlier found samples.<\/p>\n<p>From its inception, Joker family malware continued to find their way on Google Play Store by using different tricks. In January last year, Google informed about the removal of more than 1700 Joker malware applications although many researchers continued finding apps rigged with the spyware. This is because malware authors continue to do small changes in their code or payload retrieval techniques to evade the detections.<\/p>\n<p>Here is our analysis of <strong>Easy QR Scanner <\/strong>Application &#8211;<\/p>\n<p>At launch, this application asks for storage, camera and contact access permission, followed by request to access notifications. Next, it opens the camera for scanning \u2014if we scan QR code from this application, it opens embedded URL \u2014 e.g. In Fig. 2 see scanned QR code and its result.<\/p>\n<figure id=\"attachment_89562\" aria-describedby=\"caption-attachment-89562\" style=\"width: 409px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89562\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_2-409x390.png\" alt=\"Fig. 2 Application Functionality \" width=\"409\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_2-409x390.png 409w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_2-300x286.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_2-768x733.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_2-789x753.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_2.png 1136w\" sizes=\"(max-width: 409px) 100vw, 409px\" \/><figcaption id=\"caption-attachment-89562\" class=\"wp-caption-text\">Fig. 2 Application Functionality<\/figcaption><\/figure>\n<p>The application seems useful for now but, it does the malicious activity in the background without the user\u2019s knowledge.<\/p>\n<figure id=\"attachment_89563\" aria-describedby=\"caption-attachment-89563\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89563\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_3-650x174.png\" alt=\"Fig.3 Packages of application and payloads\" width=\"650\" height=\"174\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_3-650x174.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_3-300x80.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_3-768x205.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_3-789x211.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_3.png 1353w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89563\" class=\"wp-caption-text\">Fig.3 Packages of application and payloads<\/figcaption><\/figure>\n<p>Fig. 3 shows packages from Easy QR Scanner application and it\u2019s downloaded payloads. In this application, three different payloads are downloaded one after another. Original applications have used Tencent packer to hide its malicious payload downloading functionality. At runtime, it unpacks this application and downloads first stage payload.<\/p>\n<p>First stage payload, <strong>xiwa.doc,<\/strong> is downloaded from C&amp;C<strong> jordi.oss-us-east-1.aliyuncs.com<\/strong><\/p>\n<figure id=\"attachment_89564\" aria-describedby=\"caption-attachment-89564\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89564\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_4-650x92.png\" alt=\"Fig.4 Three payloads downloaded in three consecutive requests.\" width=\"650\" height=\"92\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_4-650x92.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_4-300x42.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_4-768x108.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_4-789x111.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_4.png 1015w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89564\" class=\"wp-caption-text\">Fig.4 Three payloads downloaded in three consecutive requests.<\/figcaption><\/figure>\n<p>Here is the first entry from Network log for application <strong>\u201cEasy QR Scanner\u201d<\/strong><\/p>\n<p>{<\/p>\n<p>&#8220;Entry&#8221;: 1,<\/p>\n<p>&#8220;Application&#8221;: &#8220;Easy QR Scanner&#8221;,<\/p>\n<p>&#8220;Application package name &#8220;: &#8220;com.easyqr.scannertool&#8221;,<\/p>\n<p>&#8220;Request url&#8221;: &#8220;http:\/\/jordi.oss-us-east-1.aliyuncs.com\/closer\/xiwa.doc&#8221;,<\/p>\n<p>&#8220;Request method&#8221;: &#8220;GET&#8221;,<\/p>\n<p>&#8220;Version&#8221;: &#8220;HTTP\/1.1&#8221;,<\/p>\n<p>&#8220;Status code&#8221;: &#8220;200 OK&#8221;,<\/p>\n<p>&#8220;Remote address&#8221;: &#8220;47.253.30.162&#8221;,<\/p>\n<p>&#8220;Domain&#8221;: &#8220;jordi.oss-us-east-1.aliyuncs.com&#8221;,<\/p>\n<p>&#8220;Content type&#8221;: &#8220;application\/msword&#8221;,<\/p>\n<p>&#8220;Port&#8221;: &#8220;443&#8221;,<\/p>\n<p>&#8220;SSL&#8221;: null<\/p>\n<p>}<\/p>\n<p>This file &#8211; xiwa.doc contains code to download next stage payload kudo.doc.<\/p>\n<figure id=\"attachment_89565\" aria-describedby=\"caption-attachment-89565\" style=\"width: 649px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89565\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_5.png\" alt=\"Fig. 5 Code snippet of first stage payload\" width=\"649\" height=\"245\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_5.png 649w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_5-300x113.png 300w\" sizes=\"(max-width: 649px) 100vw, 649px\" \/><figcaption id=\"caption-attachment-89565\" class=\"wp-caption-text\">Fig. 5 Code snippet of first stage payload<\/figcaption><\/figure>\n<p>This second stage payload contains the code to check Sim Operator code and code to ask notification access. Sim operator code can be accessed using <em>getSimOperator <\/em>method, which returns [mobile country code + mobile network code]. It also has code to download 3<sup>rd<\/sup> and final stage payload &#8211; <strong>closer.doc.<\/strong><\/p>\n<figure id=\"attachment_89566\" aria-describedby=\"caption-attachment-89566\" style=\"width: 624px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89566\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_6-624x390.png\" alt=\"Fig. 6 Code snippet of 2nd stage payload\" width=\"624\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_6-624x390.png 624w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_6-300x187.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_6-768x480.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_6-789x493.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_6.png 802w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><figcaption id=\"caption-attachment-89566\" class=\"wp-caption-text\">Fig. 6 Code snippet of 2nd stage payload<\/figcaption><\/figure>\n<h2>Final stage payload &#8211; closer.doc<\/h2>\n<p>This is the final malicious payload responsible for Joker\u2019s behaviour. Below is a code snippet showing BroadcastReceiver\u2019s onReceive method \u2014 it collects received message data.<\/p>\n<figure id=\"attachment_89579\" aria-describedby=\"caption-attachment-89579\" style=\"width: 628px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89579\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_7-3.png\" alt=\"Fig 7. Code snippet of received SMS collection \" width=\"628\" height=\"151\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_7-3.png 628w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_7-3-300x72.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><figcaption id=\"caption-attachment-89579\" class=\"wp-caption-text\">Fig 7. Code snippet of received SMS collection<\/figcaption><\/figure>\n<p>String obfuscation is used to avoid pattern-based signature detections.<\/p>\n<figure id=\"attachment_89569\" aria-describedby=\"caption-attachment-89569\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89569\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_8-650x52.png\" alt=\"Fig.8 String obfuscation\" width=\"650\" height=\"52\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_8-650x52.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_8-300x24.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_8-768x61.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_8-789x63.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_8.png 826w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89569\" class=\"wp-caption-text\">Fig.8 String obfuscation<\/figcaption><\/figure>\n<p>As shown in Fig. 9, It checks for Sim Operator code first and then visits a site to subscribe for a premium service. Then it requests for OTP and submits the received OTP without user\u2019s knowledge or consent.<\/p>\n<figure id=\"attachment_89570\" aria-describedby=\"caption-attachment-89570\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89570\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Fig_9-650x180.png\" alt=\"Fig. 9 Subscribing for premium services.\" width=\"650\" height=\"180\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_9-650x180.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_9-300x83.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_9-768x213.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_9-789x219.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_9-304x84.png 304w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Fig_9.png 1147w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89570\" class=\"wp-caption-text\">Fig. 9 Subscribing for premium services.<\/figcaption><\/figure>\n<p>These types of techniques (e.g. malicious code is inside the 3<sup>rd<\/sup> stage payload) used by malware authors to bypass the security checks of Google.<\/p>\n<p>Another application we found (Free Translator) has similar behaviour. These applications look benign but do malicious activities in the background, so the user should avoid downloading these types of applications and try to use applications from trusted developers only.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Tips to stay safe<\/strong><\/h2>\n<p>1.Download applications only from trusted sources like Google Play Store.<\/p>\n<p>2.Learn how to identify fake applications in Google Play Store.<\/p>\n<p>3.Do not click on alien links received through messages or any other social media platforms.<\/p>\n<p>4.Turn off installation from unknown source option.<\/p>\n<p>5.Read the pop-up messages you get from the Android system before accepting\/allowing any new permissions.<\/p>\n<p>6.Malicious developers spoof original application names and developer names. So, make sure you are downloading genuine applications only. Often application descriptions contain typos and grammatical mistakes. Check the developer\u2019s website if a link is available on the application\u2019s webpage. Avoid using it if anything looks strange or odd.<\/p>\n<p>7.Reviews and ratings can be fake but still reading user reviews of the application and the experience of existing users can be helpful. Pay attention to reviews with low ratings.<\/p>\n<p>8.Check download count of the application \u2014 popular applications have very high download counts. But do note that some fake applications have been downloaded thousands or even millions of times before they were discovered.<\/p>\n<p>9.Avoid downloading applications from third-party application stores or links provided in SMSs, emails, or WhatsApp messages. Also, avoid installing applications that are downloaded after clicking on an advertisement.<\/p>\n<p>10.Use a trusted anti-virus like <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-mobile-security\">Quick Heal Mobile Security<\/a> to stay safe from Android malware.<\/p>\n<p><strong>IOC:<\/strong><\/p>\n<p>MD5: 3bbf45eab9796a2781e640393fae7423<\/p>\n<p>MD5: f733cfe88fc4089523a634675f808100<\/p>\n<p><strong>URLs of payload:<\/strong><\/p>\n<p>hxxp:\/\/jordi[.]oss-us-east-1[.]aliyuncs.com\/closer\/xiwa.doc<\/p>\n<p>hxxp:\/\/jordi[.]oss-us-east-1[.]aliyuncs.com\/closer\/kubo.doc<\/p>\n<p>hxxp:\/\/jordi[.]oss-us-east-1[.]aliyuncs.com\/closer\/closer.doc<\/p>\n<p>hxxp:\/\/feeli[.]oss-us-east-1[.]aliyuncs.com\/feel\/kouj.asx<\/p>\n<p>hxxp:\/\/feeli[.]oss-us-east-1[.]aliyuncs.com\/feel\/gechagn.asx<\/p>\n<p>hxxp:\/\/feeli[.]oss-us-east-1[.]aliyuncs.com\/feel\/feel.asx<\/p>\n<p><strong>Final C&amp;C<\/strong><\/p>\n<p>47[.]241[.]106[.]26<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We recently came across 2 malicious Joker family malware applications on Google Play Store\u00a0 \u2014 the company was quick to remove these malicious applications from their store based on our report. These two applications, namely \u201cEasy QR Scanner\u201d and \u201cFree Translator\u201d have more than 10k installs each. What is Joker Malware? Joker is spyware which [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":89572,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[968],"tags":[431,1771,49],"class_list":["post-89557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spyware","tag-android","tag-joker","tag-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89557"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89557"}],"version-history":[{"count":8,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89557\/revisions"}],"predecessor-version":[{"id":91534,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89557\/revisions\/91534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89572"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}