Resubmissions

24-09-2022 04:28

220924-e3s1babhej 8

23-09-2022 06:47

220923-hj7wxaddd8 8

General

  • Target

    0565fea51c45e4b963ca3a728c0f80c0bb7f3a86aa8fd89d3cd09356d8f8c1b3.apk

  • Size

    20.6MB

  • Sample

    220923-hj7wxaddd8

  • MD5

    310de0009c04ff6b1cefd99a5941f0dc

  • SHA1

    e1440b9d5df0e715bf23035a5b3c9d1126f48b8a

  • SHA256

    0565fea51c45e4b963ca3a728c0f80c0bb7f3a86aa8fd89d3cd09356d8f8c1b3

  • SHA512

    2d013ba87a0d5ffb6e6d223ad2959ecfd40106d86d043cf208953e1fecf8920eeb9f405810eb8b6e70c4f601bd4ca5ba45e6d8821d27381c3848e61225516d25

  • SSDEEP

    393216:aHQrtsJA35z7A79L+3Gl1mbgafiubcRZfb9T9i/zVN2I+TXnNUKpPbNiRSKcsPJU:GJA35z7c5jjmbBffcHfPi/zVN2IkXmWh

Score
8/10

Malware Config

Targets

    • Target

      0565fea51c45e4b963ca3a728c0f80c0bb7f3a86aa8fd89d3cd09356d8f8c1b3.apk

    • Size

      20.6MB

    • MD5

      310de0009c04ff6b1cefd99a5941f0dc

    • SHA1

      e1440b9d5df0e715bf23035a5b3c9d1126f48b8a

    • SHA256

      0565fea51c45e4b963ca3a728c0f80c0bb7f3a86aa8fd89d3cd09356d8f8c1b3

    • SHA512

      2d013ba87a0d5ffb6e6d223ad2959ecfd40106d86d043cf208953e1fecf8920eeb9f405810eb8b6e70c4f601bd4ca5ba45e6d8821d27381c3848e61225516d25

    • SSDEEP

      393216:aHQrtsJA35z7A79L+3Gl1mbgafiubcRZfb9T9i/zVN2I+TXnNUKpPbNiRSKcsPJU:GJA35z7c5jjmbBffcHfPi/zVN2IkXmWh

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks