Resubmissions

17-01-2021 18:14

210117-qvtybyyzde 7

14-01-2021 09:50

210114-5tz18frvb2 7

General

  • Target

    moa.apk

  • Size

    6.2MB

  • Sample

    210114-5tz18frvb2

  • MD5

    05e59ac3d920a3b57a1e086a46d04501

  • SHA1

    fc247025ce61518b5636754868d42a23ec16b0a7

  • SHA256

    9db596bf58f59a3940fb1354d141cc1523c9945d84797f03919989945bb29390

  • SHA512

    d4cb440e918c793e2cedb980f989a0730b3997782efc5f4c2777f2026364a8c66e89d57f8f67a5336ff13a99a39f4a0afc966792e01412f8d9faf9e091509408

Score
7/10

Malware Config

Targets

    • Target

      moa.apk

    • Size

      6.2MB

    • MD5

      05e59ac3d920a3b57a1e086a46d04501

    • SHA1

      fc247025ce61518b5636754868d42a23ec16b0a7

    • SHA256

      9db596bf58f59a3940fb1354d141cc1523c9945d84797f03919989945bb29390

    • SHA512

      d4cb440e918c793e2cedb980f989a0730b3997782efc5f4c2777f2026364a8c66e89d57f8f67a5336ff13a99a39f4a0afc966792e01412f8d9faf9e091509408

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Reads serial number of SIM

MITRE ATT&CK Matrix

Tasks