{"id":89963,"date":"2021-06-11T19:28:59","date_gmt":"2021-06-11T13:58:59","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89963"},"modified":"2023-08-08T17:56:57","modified_gmt":"2023-08-08T12:26:57","slug":"google-play-store-applications-laced-with-joker-malware-yet-again","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/google-play-store-applications-laced-with-joker-malware-yet-again\/","title":{"rendered":"Google Play store applications laced with Joker malware yet again"},"content":{"rendered":"<p>For the last three years, Joker Trojan is making its way on Google Play Store. Quick Heal Security Labs recently spotted 8 Joker malware on Google Play Store and reported them to Google, which has now removed all the applications.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89964 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/06\/Fig1-300x228.png\" alt=\"\" width=\"530\" height=\"402\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig1-300x228.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig1-513x390.png 513w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig1-768x584.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig1-789x600.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig1.png 1112w\" sizes=\"(max-width: 530px) 100vw, 530px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 1 Screenshots of Applications from Google Play Store<\/em><\/p>\n<p>Joker is a <a href=\"https:\/\/blogs.quickheal.com\/8-tips-to-avoid-a-spyware-attack\/\">spyware<\/a> Trojan that steals the victim\u2019s device like SMS messages, contact list, and device info. Then, it silently interacts with advertisement websites and subscribes the victim to premium services without their knowledge. In January, we have reported similar samples to Google and published a <a href=\"https:\/\/blogs.quickheal.com\/stay-alert-joker-still-making-its-way-on-google-play-store\/\">blog<\/a> on the same.<\/p>\n<h4><strong>Let&#8217;s see the working of one of the applications-<\/strong><\/h4>\n<ul>\n<li>Application name: Element Scanner<\/li>\n<li>Developer name: Obrien Connie<\/li>\n<li>Download Count: 10K+<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>At launch, this application asks for notification access, which is used to get notification data. This application takes SMS data from notifications, asks for Contacts access, and makes and manages phone call permission. After that, it is working like a document scanner application without showing any visible malicious activity to the user.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89965 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/06\/Fig2-300x105.png\" alt=\"\" width=\"554\" height=\"194\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig2-300x105.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig2-650x228.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig2-768x269.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig2-789x277.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig2.png 1392w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 2 Permissions asked by Application<\/em><\/p>\n<p>But in the background, it downloads two payloads, one after the other. The first payload is downloaded from a Bitly short URL link, which is present in the original application from Google Play Store. See fig. 3 This application has link &#8220;h**p:\/\/bit[.]ly\/3hT17RL&#8221;. Then this payload further downloads the next payload from the link &#8211; \u201ch**p:\/\/skullali[.]oss-me-east 1[.]aliyuncs.com\/realease.mp3\u201d. This payload is nothing but malicious joker malware.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89966 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/06\/Fig3-300x194.png\" alt=\"\" width=\"681\" height=\"440\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig3-300x194.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig3-602x390.png 602w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig3-768x497.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig3-789x511.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig3.png 1198w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 3 Payload downloading flow<\/em><\/p>\n<p>This final payload releases the .mp3 file, which contains code for notification access (Ref. Fig. 4), and the <em>onReceive<\/em> method (Ref. Fig. 5), which collects received SMS data.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89967 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/06\/Fig4-300x107.png\" alt=\"\" width=\"601\" height=\"214\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig4-300x107.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig4-650x231.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig4-768x273.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig4.png 781w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/p>\n<p style=\"text-align: center;\"><em><span class=\"TextRun SCXW43602930 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW43602930 BCX0\">Fig. 4 Code for notification access<\/span><\/span><span class=\"EOP SCXW43602930 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89968 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/06\/Fig5-300x122.png\" alt=\"\" width=\"599\" height=\"243\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig5-300x122.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig5-650x264.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig5-768x312.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig5-789x321.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig5.png 809w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 5 Implementation of onReceive method<\/em><\/p>\n<p>It also checks for the SIM provider\u2019s country code. If this code starts with \u201c520,\u201d i.e., if Sim providers country is Thailand, it subscribes the user to premium services as shown in Fig.5.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89969 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/06\/Fig6-300x140.png\" alt=\"\" width=\"650\" height=\"303\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig6-300x140.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig6-650x303.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig6-768x358.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig6-789x368.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/06\/Fig6.png 1067w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em><span class=\"NormalTextRun BCX0 SCXW89213333\">Fig.<\/span><span class=\"NormalTextRun BCX0 SCXW89213333\">6<\/span><span class=\"NormalTextRun BCX0 SCXW89213333\">\u00a0Code for subscription<\/span><\/em><\/p>\n<p>Malware authors spread these malware applications on the Google Play Store in scanner applications, wallpaper applications, message applications. These types of applications can quickly become a target. Users should try to avoid such applications and use such kinds of applications only from trusted developers.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>IOC:<\/strong><\/h4>\n<table style=\"font-weight: 400;\" border=\"1\" data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1696\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" data-celllook=\"0\"><strong>MD5\u00a0<\/strong><\/td>\n<td style=\"text-align: center;\" data-celllook=\"0\"><strong>Detection\u00a0Name\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">05710c8525f31535eb7338653429b1fa<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Joker.Aad66<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">9add1126cd52900c06ce4fe58ffc5f25<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Jocker.Abd79<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">4705ce82dd8a969139f07b9576715dca<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Agent.Aed3f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">17c9de7d2a62fb0ed640fd2a348d6ffd<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Joker.Af409<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">e4caf7c6a04139326d34bdb9b7282b00<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Agent.Aec9e<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">6b11d98e9713b3f3a53e201394c1247b<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Joker.Af408<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">995caba3370a6df5e73790d3461811e9<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Joker.Af406<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">dfe73757188ebe9d10aded37b349400b<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Android.Joker.Af407<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h4><strong>C2 server:<\/strong><\/h4>\n<ul>\n<li>hxxp:\/\/buckts[.]oss-me-east-1[.]aliyuncs[.]com<\/li>\n<li>hxxp:\/\/wter[.]oss-us-east-1[.]aliyuncs[.]com\/<\/li>\n<li>hxxp:\/\/skullali[.]oss-us-east-1[.]aliyuncs[.]com\/<\/li>\n<li>hxxp:\/\/161.117.46.64\/svhyqj\/mjcxzy<\/li>\n<li>hxxp:\/\/suanleba[.]oss-us-west-1[.]aliyuncs[.]com<\/li>\n<li>hxxps:\/\/new-sk.]oss-ap-southeast-1.]aliyuncs.]com<\/li>\n<li>hxxp:\/\/517-1305586011.]cos.]na-toronto.]myqcloud.]com\/b2<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>Tips to stay safe<\/strong><\/h4>\n<ul>\n<li>Download applications only from trusted sources like Google Play Store.<\/li>\n<li>Learn how to identify fake applications in Google Play Store.<\/li>\n<li>Do not click on alien links received through messages or any other social media platforms.<\/li>\n<li>Turn off installation from the unknown source option.<\/li>\n<li>Read the pop-up messages you get from the Android system before accepting\/allowing any new permissions.<\/li>\n<li>Malicious developers spoof original application names and developer names. So, make sure you are downloading simple applications only. Often application descriptions contain typos and grammatical mistakes. Check the developer\u2019s website if a link is available on the application\u2019s webpage. Avoid using it if anything looks strange or odd.<\/li>\n<li>Reviews and ratings can be fake but still reading user reviews of the application, and the experience of existing users can be helpful. Pay attention to reviews with low ratings.<\/li>\n<li>Check download count of the application \u2014 popular applications have very high download counts. But do note that some fake applications have been downloaded thousands or even millions of times before they were discovered.<\/li>\n<li>Avoid downloading applications from third-party application stores or links provided in SMSs, emails, or WhatsApp messages. Also, avoid installing applications that are downloaded after clicking on an advertisement.<\/li>\n<li>Use a trusted antivirus like <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-mobile-security\">Quick Heal Mobile Security<\/a> to stay safe from Android malware.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>For the last three years, Joker Trojan is making its way on Google Play Store. Quick Heal Security Labs recently spotted 8 Joker malware on Google Play Store and reported them to Google, which has now removed all the applications. Fig. 1 Screenshots of Applications from Google Play Store Joker is a spyware Trojan that [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":90059,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,24,354],"tags":[431,1821,1822,218,1823,1820,1771,49,19],"class_list":["post-89963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-malware","category-mobile-security-2","tag-android","tag-androidmalware","tag-androidsecurity","tag-google","tag-googleapps","tag-googleplaystore","tag-joker","tag-malware","tag-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89963"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89963"}],"version-history":[{"count":18,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89963\/revisions"}],"predecessor-version":[{"id":91466,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89963\/revisions\/91466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/90059"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}