Resubmissions

17-01-2021 18:22

210117-yzgr1acfsn 10

05-01-2021 13:44

210105-tpftmb7x46 10

General

  • Target

    xcejgqilan.apk

  • Size

    205KB

  • Sample

    210117-yzgr1acfsn

  • MD5

    11f00bf6879962c2a47cf3ac941036ea

  • SHA1

    8ce41bf486fede24004aadc8495c339c7ca06484

  • SHA256

    7886433ed316d47a88323499397e698f560f75689c0c5ce93efb2fd1bc8ece09

  • SHA512

    b49eb7e9aaba2bd8e599ece317a50945bf725b87bb3e62f273a21c31a28d9a0b46ad968691189e784960de624dd6903dd9eb5cb9bc587e79c4409272d4fc3500

Malware Config

Extracted

DES_key

Targets

    • Target

      xcejgqilan.apk

    • Size

      205KB

    • MD5

      11f00bf6879962c2a47cf3ac941036ea

    • SHA1

      8ce41bf486fede24004aadc8495c339c7ca06484

    • SHA256

      7886433ed316d47a88323499397e698f560f75689c0c5ce93efb2fd1bc8ece09

    • SHA512

      b49eb7e9aaba2bd8e599ece317a50945bf725b87bb3e62f273a21c31a28d9a0b46ad968691189e784960de624dd6903dd9eb5cb9bc587e79c4409272d4fc3500

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks