Resubmissions

17-01-2021 18:17

210117-2t1gv3dzsj 10

16-01-2021 08:43

210116-fnmwcm13js 10

General

  • Target

    xbafaaflpk.apk

  • Size

    204KB

  • Sample

    210116-fnmwcm13js

  • MD5

    4c976607cb1d0c0f3f082ef8dac8f22e

  • SHA1

    98e053c1e63f17622e38d3798f5e65e544e9b490

  • SHA256

    84dace68c129c0babe472e1a14c3fc95e8349cc2854f536ff3e53b0a394cbd2f

  • SHA512

    1082f6c45b16e990b288a81aa974f73a669b331cc0a34ee7511ca3f45322ee9159dffafab520855620e8ffe744e25e9c8b228a58eb0bb8ee62b36e40dfef9e5d

Malware Config

Extracted

DES_key

Targets

    • Target

      xbafaaflpk.apk

    • Size

      204KB

    • MD5

      4c976607cb1d0c0f3f082ef8dac8f22e

    • SHA1

      98e053c1e63f17622e38d3798f5e65e544e9b490

    • SHA256

      84dace68c129c0babe472e1a14c3fc95e8349cc2854f536ff3e53b0a394cbd2f

    • SHA512

      1082f6c45b16e990b288a81aa974f73a669b331cc0a34ee7511ca3f45322ee9159dffafab520855620e8ffe744e25e9c8b228a58eb0bb8ee62b36e40dfef9e5d

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks