General

  • Target

    4a8654dd87cc6e82b29b7683306ec5841ee24faad3e636fb48021390e78cac72.apk

  • Size

    3.3MB

  • Sample

    210809-f6s9q23cy2

  • MD5

    a263e0566fd079b88eebca24b9c14285

  • SHA1

    d28c0242a4fc0e3567e5e26e1b5e94962f5bf653

  • SHA256

    4a8654dd87cc6e82b29b7683306ec5841ee24faad3e636fb48021390e78cac72

  • SHA512

    66739e3b515de31395381ebc1f65dad5d2b94fa0fe32ce9e102a8444fb6f02e76c23723284edcb7d0f0406f1a66641ee64c08def5cb7d06785aa69bee709351d

Malware Config

Targets

    • Target

      4a8654dd87cc6e82b29b7683306ec5841ee24faad3e636fb48021390e78cac72.apk

    • Size

      3.3MB

    • MD5

      a263e0566fd079b88eebca24b9c14285

    • SHA1

      d28c0242a4fc0e3567e5e26e1b5e94962f5bf653

    • SHA256

      4a8654dd87cc6e82b29b7683306ec5841ee24faad3e636fb48021390e78cac72

    • SHA512

      66739e3b515de31395381ebc1f65dad5d2b94fa0fe32ce9e102a8444fb6f02e76c23723284edcb7d0f0406f1a66641ee64c08def5cb7d06785aa69bee709351d

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks