General

  • Target

    b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb.apk

  • Size

    20.6MB

  • Sample

    220910-g4bhrsdddl

  • MD5

    435cf6ca76dacc135c816eed98db31dd

  • SHA1

    ec8ec75b5e50ecbfc82ed3e486ff22aa0d64b900

  • SHA256

    b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb

  • SHA512

    32bfe6e7aadbd0d30751656db0f241d4ff9388f8144ed45f06bba5928325b5acb1270af7fc71aa6fef6f274628d5f81201de5e40346295c696536f407294a2a8

  • SSDEEP

    393216:+NvssJA35z7A79L+9SJ1mbgafiubcSZ7bnT9i/zVN2I+TXC52KpPbNiRSKcsxJ0:sLJA35z7c5x/mbBffcI7Vi/zVN2Iky8m

Score
8/10

Malware Config

Targets

    • Target

      b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb.apk

    • Size

      20.6MB

    • MD5

      435cf6ca76dacc135c816eed98db31dd

    • SHA1

      ec8ec75b5e50ecbfc82ed3e486ff22aa0d64b900

    • SHA256

      b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb

    • SHA512

      32bfe6e7aadbd0d30751656db0f241d4ff9388f8144ed45f06bba5928325b5acb1270af7fc71aa6fef6f274628d5f81201de5e40346295c696536f407294a2a8

    • SSDEEP

      393216:+NvssJA35z7A79L+9SJ1mbgafiubcSZ7bnT9i/zVN2I+TXC52KpPbNiRSKcsxJ0:sLJA35z7c5x/mbBffcI7Vi/zVN2Iky8m

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks