Resubmissions

21-07-2022 15:40

220721-s364tsghfk 10

20-07-2022 03:38

220720-d7kztsbdg5 8

17-06-2022 11:30

220617-nl5gfsecc3 8

General

  • Target

    0759a60e09710321dfc42b09518516398785f60e150012d15be88bbb2ea788db

  • Size

    3.2MB

  • Sample

    220617-nl5gfsecc3

  • MD5

    bb98d68156b619928db5122ffbd9dce5

  • SHA1

    b1dfb2be760d209846f2147ce32560954d2f71b5

  • SHA256

    0759a60e09710321dfc42b09518516398785f60e150012d15be88bbb2ea788db

  • SHA512

    c138e74c1ef6c9da94c1a1240cf590dffad9e7656fadcdf934ee313c4b4e0a1c9ee2a11661a4fa96251d1459fc460f4650200b83d8af69b34bcf87aea6c84cb3

Malware Config

Targets

    • Target

      0759a60e09710321dfc42b09518516398785f60e150012d15be88bbb2ea788db

    • Size

      3.2MB

    • MD5

      bb98d68156b619928db5122ffbd9dce5

    • SHA1

      b1dfb2be760d209846f2147ce32560954d2f71b5

    • SHA256

      0759a60e09710321dfc42b09518516398785f60e150012d15be88bbb2ea788db

    • SHA512

      c138e74c1ef6c9da94c1a1240cf590dffad9e7656fadcdf934ee313c4b4e0a1c9ee2a11661a4fa96251d1459fc460f4650200b83d8af69b34bcf87aea6c84cb3

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks