General

  • Target

    a5e18613b38375ad4960e209b04229c54fc232e3a3ee9811db6ffdfcaaefeb1a

  • Size

    2.6MB

  • Sample

    220515-z63n5sabap

  • MD5

    dce81566229914fc3db754020424bf78

  • SHA1

    8ea70cb4e5176a1f9814311c737dec734a1ac9e2

  • SHA256

    a5e18613b38375ad4960e209b04229c54fc232e3a3ee9811db6ffdfcaaefeb1a

  • SHA512

    49e8581d9dd7ace6fc23abf2310031e5a2d4e74fc507b0219df95a3de16dc058da7fa1c6a6b7cc4cdbb759c55518865a259d99655ede36a7ea872cf9c1db16ef

Malware Config

Targets

    • Target

      a5e18613b38375ad4960e209b04229c54fc232e3a3ee9811db6ffdfcaaefeb1a

    • Size

      2.6MB

    • MD5

      dce81566229914fc3db754020424bf78

    • SHA1

      8ea70cb4e5176a1f9814311c737dec734a1ac9e2

    • SHA256

      a5e18613b38375ad4960e209b04229c54fc232e3a3ee9811db6ffdfcaaefeb1a

    • SHA512

      49e8581d9dd7ace6fc23abf2310031e5a2d4e74fc507b0219df95a3de16dc058da7fa1c6a6b7cc4cdbb759c55518865a259d99655ede36a7ea872cf9c1db16ef

    • Agent smith

      Agent smith is a modular adware that installs malicious ADs into legitimate applications.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks