General

  • Target

    153b1a20f6a771be9da46713a92f3614d7d5bac8a7a625e872d06c8bb661dfb4

  • Size

    18.6MB

  • Sample

    220708-krqzgacag9

  • MD5

    5c1973f83a78a44769700388b4039715

  • SHA1

    ecdea0f797163d3a08253ae9c0b1a5b1535b82ea

  • SHA256

    153b1a20f6a771be9da46713a92f3614d7d5bac8a7a625e872d06c8bb661dfb4

  • SHA512

    dda5687cf4fe0d62ff0296cd7b7a84ae783e4a21aead256fdc339dea1a849dfa724e61264b24486b8885ff0904b35dbdf45324939fe28b506a21e061ec5efb29

Malware Config

Targets

    • Target

      153b1a20f6a771be9da46713a92f3614d7d5bac8a7a625e872d06c8bb661dfb4

    • Size

      18.6MB

    • MD5

      5c1973f83a78a44769700388b4039715

    • SHA1

      ecdea0f797163d3a08253ae9c0b1a5b1535b82ea

    • SHA256

      153b1a20f6a771be9da46713a92f3614d7d5bac8a7a625e872d06c8bb661dfb4

    • SHA512

      dda5687cf4fe0d62ff0296cd7b7a84ae783e4a21aead256fdc339dea1a849dfa724e61264b24486b8885ff0904b35dbdf45324939fe28b506a21e061ec5efb29

    • Agent smith

      Agent smith is a modular adware that installs malicious ADs into legitimate applications.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks