General

  • Target

    spo.apk

  • Size

    7.8MB

  • Sample

    210609-ltga5f4h9a

  • MD5

    31c636b5155f9c6bf71bd5c279947a88

  • SHA1

    7bf98935db59ffbdedf2fc85a6d04901608c85bc

  • SHA256

    e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7

  • SHA512

    5694d4ac85defeb91c63b01d724239eb9207f981d54aeda93b940893bae6f56cddbf28e291130b802cf26f57a27a78dcbb8cbb9d1bde5be0a2121f9c6a902eeb

Malware Config

Targets

    • Target

      spo.apk

    • Size

      7.8MB

    • MD5

      31c636b5155f9c6bf71bd5c279947a88

    • SHA1

      7bf98935db59ffbdedf2fc85a6d04901608c85bc

    • SHA256

      e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7

    • SHA512

      5694d4ac85defeb91c63b01d724239eb9207f981d54aeda93b940893bae6f56cddbf28e291130b802cf26f57a27a78dcbb8cbb9d1bde5be0a2121f9c6a902eeb

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks