General

  • Target

    dtgkbtpiqs.apk

  • Size

    205KB

  • Sample

    210119-m7nm4njfzn

  • MD5

    347bc46d7661929f72a82753d23b42a6

  • SHA1

    e296153e0ce19473c0d63697bab67e5b42a22c18

  • SHA256

    30912ef8314f01b4c78829baf87aa8624722e9b3b371b007b6dfc9a0e79a3782

  • SHA512

    74d57b235551064abdab0907109339c77de77b0f849ebeb904f6a61aa0fee0de39725d9a26348b02977d2349737fe97b92cf498fc0070a4513d0413f1e3619b4

Malware Config

Extracted

DES_key

Targets

    • Target

      dtgkbtpiqs.apk

    • Size

      205KB

    • MD5

      347bc46d7661929f72a82753d23b42a6

    • SHA1

      e296153e0ce19473c0d63697bab67e5b42a22c18

    • SHA256

      30912ef8314f01b4c78829baf87aa8624722e9b3b371b007b6dfc9a0e79a3782

    • SHA512

      74d57b235551064abdab0907109339c77de77b0f849ebeb904f6a61aa0fee0de39725d9a26348b02977d2349737fe97b92cf498fc0070a4513d0413f1e3619b4

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks