General

  • Target

    cwutqjvwcx.apk

  • Size

    205KB

  • Sample

    210120-2rzat5cvzj

  • MD5

    daaa6d12b45614c04ece14bca45578d6

  • SHA1

    bd314cbb03a40a01e0d27a967d4238dafc6607d5

  • SHA256

    9b42ce8daebc808e7f2805443c93f44647badf32f0378d6267a2e6a18bd5c46a

  • SHA512

    dd25f8525cc097f1e116331cde41e6cd4cc931a01af2ec7caeb2fb775ee4ea4849212dc3821d47dbf415aa9c2a77f21aac15344c206930902e8f41856de3ae31

Malware Config

Extracted

DES_key

Targets

    • Target

      cwutqjvwcx.apk

    • Size

      205KB

    • MD5

      daaa6d12b45614c04ece14bca45578d6

    • SHA1

      bd314cbb03a40a01e0d27a967d4238dafc6607d5

    • SHA256

      9b42ce8daebc808e7f2805443c93f44647badf32f0378d6267a2e6a18bd5c46a

    • SHA512

      dd25f8525cc097f1e116331cde41e6cd4cc931a01af2ec7caeb2fb775ee4ea4849212dc3821d47dbf415aa9c2a77f21aac15344c206930902e8f41856de3ae31

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks