General

  • Target

    304bd30bb73c0ea98947559b1c476c25a87d934d0378138cef178d6616b00105.apk

  • Size

    6.1MB

  • Sample

    211125-tkjfgsffhn

  • MD5

    db321c27feb2da461ee8e9a2ed58f1a9

  • SHA1

    cc5c73d00c55e3f38532aaa04e5fef2063fb0a13

  • SHA256

    304bd30bb73c0ea98947559b1c476c25a87d934d0378138cef178d6616b00105

  • SHA512

    fb8d3de5b1756b2015c0c41b105b487926dbdf5ad06475bdad43cc4991bb2547524f7f859ca44ad47d863e796b4965b6f13089cdeab946baefa2950d1d2a23a0

Score
7/10

Malware Config

Targets

    • Target

      304bd30bb73c0ea98947559b1c476c25a87d934d0378138cef178d6616b00105.apk

    • Size

      6.1MB

    • MD5

      db321c27feb2da461ee8e9a2ed58f1a9

    • SHA1

      cc5c73d00c55e3f38532aaa04e5fef2063fb0a13

    • SHA256

      304bd30bb73c0ea98947559b1c476c25a87d934d0378138cef178d6616b00105

    • SHA512

      fb8d3de5b1756b2015c0c41b105b487926dbdf5ad06475bdad43cc4991bb2547524f7f859ca44ad47d863e796b4965b6f13089cdeab946baefa2950d1d2a23a0

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks