General

  • Target

    dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165.apk

  • Size

    2.9MB

  • Sample

    210915-jplrasabc6

  • MD5

    1698651d6b8fd95574f62b046b4f68e5

  • SHA1

    ed0558bbfd7929cb4a28d6b095f68f26fcea4370

  • SHA256

    dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165

  • SHA512

    74d932cda56d661ade9dbf4ebcb0c092bee262a5475eded9b98010d00a97cbb6dc2083948e6ca568b238c1a801e52f096df35daa76160bfa8683bab41eb046a9

Score
8/10

Malware Config

Targets

    • Target

      dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165.apk

    • Size

      2.9MB

    • MD5

      1698651d6b8fd95574f62b046b4f68e5

    • SHA1

      ed0558bbfd7929cb4a28d6b095f68f26fcea4370

    • SHA256

      dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165

    • SHA512

      74d932cda56d661ade9dbf4ebcb0c092bee262a5475eded9b98010d00a97cbb6dc2083948e6ca568b238c1a801e52f096df35daa76160bfa8683bab41eb046a9

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks