General

  • Target

    Android build.apk

  • Size

    117KB

  • Sample

    210803-6kke52yzm2

  • MD5

    eb31c7b8e576acb333091123c47fb5bb

  • SHA1

    6dffb481576663dd22edaf4b827dd0ae01155529

  • SHA256

    4dd5b5065aaefd11ec4880ff933dbbc6e2f27ef8d4fc61a6cb5b91935d879a10

  • SHA512

    6a2e9678411845de029170fe9b26dda8a365fed7a9e47fc6f6b57c1775a956681cac6626ef68ee246bcf09262fc16e6e4e4888b650f1b76a4f54c61376db09b1

Score
8/10

Malware Config

Targets

    • Target

      Android build.apk

    • Size

      117KB

    • MD5

      eb31c7b8e576acb333091123c47fb5bb

    • SHA1

      6dffb481576663dd22edaf4b827dd0ae01155529

    • SHA256

      4dd5b5065aaefd11ec4880ff933dbbc6e2f27ef8d4fc61a6cb5b91935d879a10

    • SHA512

      6a2e9678411845de029170fe9b26dda8a365fed7a9e47fc6f6b57c1775a956681cac6626ef68ee246bcf09262fc16e6e4e4888b650f1b76a4f54c61376db09b1

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks