General

  • Target

    bf3b00341110a781811dfab3d7e846ff133fea46349e742ae4b39b3b395dde6d

  • Size

    16.3MB

  • Sample

    220520-gyhpwsdef2

  • MD5

    c4d0ed639626b6bd9f314d11565eaac8

  • SHA1

    5ed4d8b142afe48dfc0ee9e2ff70901c2359e03d

  • SHA256

    bf3b00341110a781811dfab3d7e846ff133fea46349e742ae4b39b3b395dde6d

  • SHA512

    bccfe1ba957f771c0575bfe923552c32c7931d5dc3f483c59df55912b7d440edab2e2f684007376bfeb813b5be7905e698b5cd354d40b237c16b23ac2e04c296

Malware Config

Targets

    • Target

      bf3b00341110a781811dfab3d7e846ff133fea46349e742ae4b39b3b395dde6d

    • Size

      16.3MB

    • MD5

      c4d0ed639626b6bd9f314d11565eaac8

    • SHA1

      5ed4d8b142afe48dfc0ee9e2ff70901c2359e03d

    • SHA256

      bf3b00341110a781811dfab3d7e846ff133fea46349e742ae4b39b3b395dde6d

    • SHA512

      bccfe1ba957f771c0575bfe923552c32c7931d5dc3f483c59df55912b7d440edab2e2f684007376bfeb813b5be7905e698b5cd354d40b237c16b23ac2e04c296

    • Agent smith

      Agent smith is a modular adware that installs malicious ADs into legitimate applications.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks