General

  • Target

    5c527a2bbb2894a199826059892202c28b7c0258c5dc7567fe9249332594fe8d

  • Size

    765KB

  • Sample

    201122-6rpwmnbxlj

  • MD5

    8e0d8b35aa77ced25b40ca6986696a0e

  • SHA1

    e84c092a44400cd1face3d806349dec99f172f4e

  • SHA256

    5c527a2bbb2894a199826059892202c28b7c0258c5dc7567fe9249332594fe8d

  • SHA512

    76237f1a0da2a0799c91f87e9ac8bf53db5df0b976ab3399162a7e457aae5d6d342b9f52b5e112a89fc916e8600561392b09210bbad8b30b98caf6a241d29bd4

Malware Config

Targets

    • Target

      5c527a2bbb2894a199826059892202c28b7c0258c5dc7567fe9249332594fe8d

    • Size

      765KB

    • MD5

      8e0d8b35aa77ced25b40ca6986696a0e

    • SHA1

      e84c092a44400cd1face3d806349dec99f172f4e

    • SHA256

      5c527a2bbb2894a199826059892202c28b7c0258c5dc7567fe9249332594fe8d

    • SHA512

      76237f1a0da2a0799c91f87e9ac8bf53db5df0b976ab3399162a7e457aae5d6d342b9f52b5e112a89fc916e8600561392b09210bbad8b30b98caf6a241d29bd4

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks