General

  • Target

    fc6a458c907d921b376f36c461e22d90ca3a61e35c87b70c84043cb632bdd5c6.apk

  • Size

    3.3MB

  • Sample

    210804-8l1p8qw7b2

  • MD5

    033d72e8cb52a46e7c24a4840ddaec47

  • SHA1

    caf416e31345f606c8cd7fe6293328c7ce3fe14a

  • SHA256

    fc6a458c907d921b376f36c461e22d90ca3a61e35c87b70c84043cb632bdd5c6

  • SHA512

    b55a414aba8470427e2ac1611f77a32a251ac8abd67e99be4f8e40d7a3c12396304cc00d977f58ceeb4d73ff6c9cba9c29129ee978dbb7ede58189ec60d8e77f

Malware Config

Targets

    • Target

      fc6a458c907d921b376f36c461e22d90ca3a61e35c87b70c84043cb632bdd5c6.apk

    • Size

      3.3MB

    • MD5

      033d72e8cb52a46e7c24a4840ddaec47

    • SHA1

      caf416e31345f606c8cd7fe6293328c7ce3fe14a

    • SHA256

      fc6a458c907d921b376f36c461e22d90ca3a61e35c87b70c84043cb632bdd5c6

    • SHA512

      b55a414aba8470427e2ac1611f77a32a251ac8abd67e99be4f8e40d7a3c12396304cc00d977f58ceeb4d73ff6c9cba9c29129ee978dbb7ede58189ec60d8e77f

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks