General

  • Target

    vpn.apk

  • Size

    11.7MB

  • Sample

    210723-l6q873m6ne

  • MD5

    7c0cd559529802d65b1b52c342c2e9b3

  • SHA1

    97b2369d4c1d03cf9c5823ceff58cc8d0c7e6c69

  • SHA256

    029c81d21ac17edde01befa25d3077046913ad8e968f30528b32e72bc7926d93

  • SHA512

    ee018be821e000cfe19809e02dad8bf75c687c726bd41c7627d43ba3d0c50533e5ebb19f85f798a340a55ee6223e28197491035188ed9c7f13eb3d67eb0fd42d

Malware Config

Targets

    • Target

      vpn.apk

    • Size

      11.7MB

    • MD5

      7c0cd559529802d65b1b52c342c2e9b3

    • SHA1

      97b2369d4c1d03cf9c5823ceff58cc8d0c7e6c69

    • SHA256

      029c81d21ac17edde01befa25d3077046913ad8e968f30528b32e72bc7926d93

    • SHA512

      ee018be821e000cfe19809e02dad8bf75c687c726bd41c7627d43ba3d0c50533e5ebb19f85f798a340a55ee6223e28197491035188ed9c7f13eb3d67eb0fd42d

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks