General

  • Target

    06139537f915eda7e2f8e39c0ddb4b7de2e2ea9835497bcd375b232cae7a5e41

  • Size

    2.6MB

  • Sample

    220515-1p3s9abadj

  • MD5

    cd99698094b525e74cf8e9069ba7b54c

  • SHA1

    19507066eae3f81eb78e222c08575ea8e0835fc1

  • SHA256

    06139537f915eda7e2f8e39c0ddb4b7de2e2ea9835497bcd375b232cae7a5e41

  • SHA512

    8fb9554fe6012babfe2678b310b2bb8619eb4bb10dce31d5cf35c1704ae397f2bd3e6bcef44bee26a270f33756bba1fbef01f326ae3a48609de445bb705c1fe6

Malware Config

Targets

    • Target

      06139537f915eda7e2f8e39c0ddb4b7de2e2ea9835497bcd375b232cae7a5e41

    • Size

      2.6MB

    • MD5

      cd99698094b525e74cf8e9069ba7b54c

    • SHA1

      19507066eae3f81eb78e222c08575ea8e0835fc1

    • SHA256

      06139537f915eda7e2f8e39c0ddb4b7de2e2ea9835497bcd375b232cae7a5e41

    • SHA512

      8fb9554fe6012babfe2678b310b2bb8619eb4bb10dce31d5cf35c1704ae397f2bd3e6bcef44bee26a270f33756bba1fbef01f326ae3a48609de445bb705c1fe6

    • Agent smith

      Agent smith is a modular adware that installs malicious ADs into legitimate applications.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks