General

  • Target

    tmp869ae3yn

  • Size

    2.0MB

  • Sample

    210113-wvr8cyj8wj

  • MD5

    0204df0b02c9fbf18751c829c0a0990a

  • SHA1

    75d433e3a4d95a946eee1e6a9c6d1bf033aad5a3

  • SHA256

    db329505e2425bc20c329e58698f70408d5221f3816326fdc5ad0feb336310d8

  • SHA512

    cdc2071a732e7a8588719b07a807842a069a8e9807f75118c32f2b74b841b4bd9fc76bae200aa18a87b25f298caa2e1af405e6ccfc204e9410b2179f138520e9

Malware Config

Targets

    • Target

      tmp869ae3yn

    • Size

      2.0MB

    • MD5

      0204df0b02c9fbf18751c829c0a0990a

    • SHA1

      75d433e3a4d95a946eee1e6a9c6d1bf033aad5a3

    • SHA256

      db329505e2425bc20c329e58698f70408d5221f3816326fdc5ad0feb336310d8

    • SHA512

      cdc2071a732e7a8588719b07a807842a069a8e9807f75118c32f2b74b841b4bd9fc76bae200aa18a87b25f298caa2e1af405e6ccfc204e9410b2179f138520e9

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks