General

  • Target

    b5c2b132bf1ab817440ef056c5221663be780d304af741d3ff69435515978406.apk

  • Size

    1.6MB

  • Sample

    210805-15be6mjlr2

  • MD5

    a8f004d782e53ba1260483dda2fda1b6

  • SHA1

    72bf1b99a371ed637c030b0e5ea918b72cc6d1c3

  • SHA256

    b5c2b132bf1ab817440ef056c5221663be780d304af741d3ff69435515978406

  • SHA512

    d75ccdc75c7185dbb7cba19b6a4f6e1e957208eb970d850c99da243d8145b828bd9364c160442a2dd56b0ad5feabfa677ae286f90e2b297da2e5d9e2ecf60496

Malware Config

Targets

    • Target

      b5c2b132bf1ab817440ef056c5221663be780d304af741d3ff69435515978406.apk

    • Size

      1.6MB

    • MD5

      a8f004d782e53ba1260483dda2fda1b6

    • SHA1

      72bf1b99a371ed637c030b0e5ea918b72cc6d1c3

    • SHA256

      b5c2b132bf1ab817440ef056c5221663be780d304af741d3ff69435515978406

    • SHA512

      d75ccdc75c7185dbb7cba19b6a4f6e1e957208eb970d850c99da243d8145b828bd9364c160442a2dd56b0ad5feabfa677ae286f90e2b297da2e5d9e2ecf60496

    • suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad

      suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad

    • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

      suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks