General

  • Target

    b7779147baf09e416e6c2b8d5146280e872d068a1738fcda930cd93c3f95065f.apk

  • Size

    4.0MB

  • Sample

    210721-jntpvx4e7e

  • MD5

    8831c6947089b59ec4dcfd90cab57ab8

  • SHA1

    279fe2d2937249c0e0affa3ae5bf52a4d3a19792

  • SHA256

    b7779147baf09e416e6c2b8d5146280e872d068a1738fcda930cd93c3f95065f

  • SHA512

    cd76853572334f162aa59c63bfaa90cf808797eb538fda40a1ee93d09d3a3b55aa3e187f1b9421ef568e54d124601b7ae014aff650e45bb7753700f8402d8f56

Malware Config

Targets

    • Target

      b7779147baf09e416e6c2b8d5146280e872d068a1738fcda930cd93c3f95065f.apk

    • Size

      4.0MB

    • MD5

      8831c6947089b59ec4dcfd90cab57ab8

    • SHA1

      279fe2d2937249c0e0affa3ae5bf52a4d3a19792

    • SHA256

      b7779147baf09e416e6c2b8d5146280e872d068a1738fcda930cd93c3f95065f

    • SHA512

      cd76853572334f162aa59c63bfaa90cf808797eb538fda40a1ee93d09d3a3b55aa3e187f1b9421ef568e54d124601b7ae014aff650e45bb7753700f8402d8f56

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks