General

  • Target

    bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk

  • Size

    4.2MB

  • Sample

    210915-hm5kysaac3

  • MD5

    6630b2e0d7430b6dc63705c471c442c4

  • SHA1

    f8bda4328d63f3d90fc862d82ce797de09f45245

  • SHA256

    bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1

  • SHA512

    c8a34d76ef4a3c9a023db15eb54d6ee04bc360624f4e3ff8c8e2e298deb0cf8ad068cf8615dd50f30c15a58d10e7357edfed6a1ba33c3ee8c954abb6906c2b67

Malware Config

Targets

    • Target

      bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk

    • Size

      4.2MB

    • MD5

      6630b2e0d7430b6dc63705c471c442c4

    • SHA1

      f8bda4328d63f3d90fc862d82ce797de09f45245

    • SHA256

      bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1

    • SHA512

      c8a34d76ef4a3c9a023db15eb54d6ee04bc360624f4e3ff8c8e2e298deb0cf8ad068cf8615dd50f30c15a58d10e7357edfed6a1ba33c3ee8c954abb6906c2b67

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks