General

  • Target

    Thunder_VPN_Vip_v4.0.9.apk

  • Size

    5.4MB

  • Sample

    210714-r2jfvcth62

  • MD5

    8116d8a6878f4409bf36694ef77ceee8

  • SHA1

    9d327a40cdcf7e1122b47fd4266662d64591f500

  • SHA256

    aa1b22ecd771367089f00c7b9124035dc108fdc35c223cd8eb1866e20aa442d7

  • SHA512

    6feed5fc9f2c19624991b2042291e1848ebf6069bdfd9049d1008dd3c60a8c610f8e387d044dce7b6d95548b26cbeda6be40d3e99a5fe5465b09128dc683acf7

Malware Config

Targets

    • Target

      Thunder_VPN_Vip_v4.0.9.apk

    • Size

      5.4MB

    • MD5

      8116d8a6878f4409bf36694ef77ceee8

    • SHA1

      9d327a40cdcf7e1122b47fd4266662d64591f500

    • SHA256

      aa1b22ecd771367089f00c7b9124035dc108fdc35c223cd8eb1866e20aa442d7

    • SHA512

      6feed5fc9f2c19624991b2042291e1848ebf6069bdfd9049d1008dd3c60a8c610f8e387d044dce7b6d95548b26cbeda6be40d3e99a5fe5465b09128dc683acf7

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks