General

  • Target

    pithus_sample_f18aba837e86025dfb9bd3fd2c4bf161f679ff1f3d10e7a480d682178051a9b9.apk

  • Size

    6.3MB

  • Sample

    210507-cgt2rcldz2

  • MD5

    547217d768ca6a46b00fc02f1ab7fb56

  • SHA1

    f68cf2783e026b7ca6d4f577819c206e4258d48b

  • SHA256

    f18aba837e86025dfb9bd3fd2c4bf161f679ff1f3d10e7a480d682178051a9b9

  • SHA512

    926b7761b728057022f0f44aec2048f12a69e6fc4e897f6900897926cbcae19e65bc4eb4438ec5d2a8c9ec097b429f35db29460d52d2861d40d761e70355fffa

Score
10/10

Malware Config

Extracted

AES_key
AES_key

Targets

    • Target

      pithus_sample_f18aba837e86025dfb9bd3fd2c4bf161f679ff1f3d10e7a480d682178051a9b9.apk

    • Size

      6.3MB

    • MD5

      547217d768ca6a46b00fc02f1ab7fb56

    • SHA1

      f68cf2783e026b7ca6d4f577819c206e4258d48b

    • SHA256

      f18aba837e86025dfb9bd3fd2c4bf161f679ff1f3d10e7a480d682178051a9b9

    • SHA512

      926b7761b728057022f0f44aec2048f12a69e6fc4e897f6900897926cbcae19e65bc4eb4438ec5d2a8c9ec097b429f35db29460d52d2861d40d761e70355fffa

    Score
    10/10
    • Checks Android system properties for emulator presence.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks