bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk

General
Target

bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk

Size

4MB

Sample

210915-hm5kysaac3

Score
8 /10
MD5

6630b2e0d7430b6dc63705c471c442c4

SHA1

f8bda4328d63f3d90fc862d82ce797de09f45245

SHA256

bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1

SHA512

c8a34d76ef4a3c9a023db15eb54d6ee04bc360624f4e3ff8c8e2e298deb0cf8ad068cf8615dd50f30c15a58d10e7357edfed6a1ba33c3ee8c954abb6906c2b67

Malware Config
Targets
Target

bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk

MD5

6630b2e0d7430b6dc63705c471c442c4

Filesize

4MB

Score
7 /10
SHA1

f8bda4328d63f3d90fc862d82ce797de09f45245

SHA256

bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1

SHA512

c8a34d76ef4a3c9a023db15eb54d6ee04bc360624f4e3ff8c8e2e298deb0cf8ad068cf8615dd50f30c15a58d10e7357edfed6a1ba33c3ee8c954abb6906c2b67

Tags

Signatures

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings.

  • Reads name of network operator

    Description

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data).

    Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          8/10

                          behavioral1

                          7/10