General

  • Target

    Fast n Clean.apk

  • Size

    9.7MB

  • Sample

    210804-xysla9ecda

  • MD5

    d29ce3e1d21751ab575b32f0a031ccfc

  • SHA1

    350cfec2bd35617805419e656e91822ba70e470b

  • SHA256

    9c75c2e8cae3b386e45db5036f1553a0e41ac4dad1377a0314350d63a4c910f8

  • SHA512

    f1dc6c8a8f3fe25148a0c3890cb0b5459e06a3e0b52de1afd5099194326d9ddd9a06e8544ad018c66fc4421b3891b68f66c417ab18d24bbe9307729c34c3113a

Malware Config

Targets

    • Target

      Fast n Clean.apk

    • Size

      9.7MB

    • MD5

      d29ce3e1d21751ab575b32f0a031ccfc

    • SHA1

      350cfec2bd35617805419e656e91822ba70e470b

    • SHA256

      9c75c2e8cae3b386e45db5036f1553a0e41ac4dad1377a0314350d63a4c910f8

    • SHA512

      f1dc6c8a8f3fe25148a0c3890cb0b5459e06a3e0b52de1afd5099194326d9ddd9a06e8544ad018c66fc4421b3891b68f66c417ab18d24bbe9307729c34c3113a

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks