General

  • Target

    tmp0m42ypcg

  • Size

    2.7MB

  • Sample

    210113-t7aghkkkwn

  • MD5

    76b35e470d17120bbd541c9e3b160ddf

  • SHA1

    feb35078107586c403adb046c48ecd23d0e6d22f

  • SHA256

    cb2aa894755825306671f2cfd4b76aa052d83dcf2a5f9d7c15887e040ab6e0d0

  • SHA512

    ad989e77eabdb53d6f4522b8aeb160d27dc0d822c86f6036ccb8da863229fc21eced4451db67b0f3aca65d78b886763df18354d6bd74c644a30838d5c54d5cff

Malware Config

Targets

    • Target

      tmp0m42ypcg

    • Size

      2.7MB

    • MD5

      76b35e470d17120bbd541c9e3b160ddf

    • SHA1

      feb35078107586c403adb046c48ecd23d0e6d22f

    • SHA256

      cb2aa894755825306671f2cfd4b76aa052d83dcf2a5f9d7c15887e040ab6e0d0

    • SHA512

      ad989e77eabdb53d6f4522b8aeb160d27dc0d822c86f6036ccb8da863229fc21eced4451db67b0f3aca65d78b886763df18354d6bd74c644a30838d5c54d5cff

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks