General

  • Target

    0832dda61151b9fea9e943877bf626e6550c5a779c2ac5b74b8b6168a722032e

  • Size

    15.2MB

  • Sample

    220502-aeck7sbgdl

  • MD5

    6e860fb11e1ea0fe15433b99af04620a

  • SHA1

    6d2234a3451e6187f7cbc058367cee927931f66a

  • SHA256

    0832dda61151b9fea9e943877bf626e6550c5a779c2ac5b74b8b6168a722032e

  • SHA512

    e4680d614e253b8324546584b72c3cb6a28e590a03e7f61382c5c333a5c27854401d523174fb209dc37448ff20ae29ca18252574489bf661a93f31fe3f55a9f0

Malware Config

Targets

    • Target

      0832dda61151b9fea9e943877bf626e6550c5a779c2ac5b74b8b6168a722032e

    • Size

      15.2MB

    • MD5

      6e860fb11e1ea0fe15433b99af04620a

    • SHA1

      6d2234a3451e6187f7cbc058367cee927931f66a

    • SHA256

      0832dda61151b9fea9e943877bf626e6550c5a779c2ac5b74b8b6168a722032e

    • SHA512

      e4680d614e253b8324546584b72c3cb6a28e590a03e7f61382c5c333a5c27854401d523174fb209dc37448ff20ae29ca18252574489bf661a93f31fe3f55a9f0

    • Agent smith

      Agent smith is a modular adware that installs malicious ADs into legitimate applications.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks