General

  • Target

    ucbcbayeup.apk

  • Size

    205KB

  • Sample

    210122-zfwbz1jyhj

  • MD5

    bfb1346a8160b6e7f15229fb009fddd6

  • SHA1

    12da5ac817e1eec0c095ce1417f51b8eced592c1

  • SHA256

    647767c8c6f05e71b95e3dcb00d229df4772ffbd858aaa23381e3cce089b2915

  • SHA512

    0c483d44aebfa86f64dbb70d2bc83923edcefa0fa08de4b4f8533edbd45ce4f23df0549dcf5e23fe5732926cfd6a16c889ca26ebc2ee7a84ee41db4e0f965423

Malware Config

Extracted

DES_key

Targets

    • Target

      ucbcbayeup.apk

    • Size

      205KB

    • MD5

      bfb1346a8160b6e7f15229fb009fddd6

    • SHA1

      12da5ac817e1eec0c095ce1417f51b8eced592c1

    • SHA256

      647767c8c6f05e71b95e3dcb00d229df4772ffbd858aaa23381e3cce089b2915

    • SHA512

      0c483d44aebfa86f64dbb70d2bc83923edcefa0fa08de4b4f8533edbd45ce4f23df0549dcf5e23fe5732926cfd6a16c889ca26ebc2ee7a84ee41db4e0f965423

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks