General

  • Target

    5a8c34d23931c33b1a0aa25b7c0bee786111db6fd053b88a5a152898bd8faaae.apk

  • Size

    4.9MB

  • Sample

    211014-nbvjhaghh2

  • MD5

    4493edef47da202d59a2fd8c183caf2b

  • SHA1

    c971a1c8ac0761abfff2220b0e1e07cb2f82a971

  • SHA256

    5a8c34d23931c33b1a0aa25b7c0bee786111db6fd053b88a5a152898bd8faaae

  • SHA512

    22a252b50f4bf936a29f407d711347b8d6816f61f38a1b6f725253c40876bb7503ceedf7830312ec3005e0a62f6c9fd6cd1037e364917aee745f6eb746374ae2

Malware Config

Targets

    • Target

      5a8c34d23931c33b1a0aa25b7c0bee786111db6fd053b88a5a152898bd8faaae.apk

    • Size

      4.9MB

    • MD5

      4493edef47da202d59a2fd8c183caf2b

    • SHA1

      c971a1c8ac0761abfff2220b0e1e07cb2f82a971

    • SHA256

      5a8c34d23931c33b1a0aa25b7c0bee786111db6fd053b88a5a152898bd8faaae

    • SHA512

      22a252b50f4bf936a29f407d711347b8d6816f61f38a1b6f725253c40876bb7503ceedf7830312ec3005e0a62f6c9fd6cd1037e364917aee745f6eb746374ae2

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks