Resubmissions

27-10-2022 16:01

221027-tghd1scgdr 10

21-10-2022 10:54

221021-mzjlgagdc9 7

General

  • Target

    02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209.apk

  • Size

    4.8MB

  • Sample

    221027-tghd1scgdr

  • MD5

    05eaa04bc27db3af51215d68a1d32d05

  • SHA1

    222bb71aecb45d4430cefa1bfa0a53c3fa4a67f0

  • SHA256

    02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209

  • SHA512

    ab273e677ebd77f552c56d2c758b7fe201356b4bfd3694a5b1bf3691d195773bc5ed7f4efed1a3f101a9312d6d9e7aefdd92bb41f306551cd8f4b947fe622934

  • SSDEEP

    98304:XM5qOMDIlsxIfmIoKw9+qpTSQPGs5A+7hyzGl/85Q9Gk:c5mDIeIeEtZE7hyzGV8Vk

Malware Config

Extracted

Family

furball

C2

http://www.firmwaresystemupdate.com/mmh

Targets

    • Target

      02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209.apk

    • Size

      4.8MB

    • MD5

      05eaa04bc27db3af51215d68a1d32d05

    • SHA1

      222bb71aecb45d4430cefa1bfa0a53c3fa4a67f0

    • SHA256

      02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209

    • SHA512

      ab273e677ebd77f552c56d2c758b7fe201356b4bfd3694a5b1bf3691d195773bc5ed7f4efed1a3f101a9312d6d9e7aefdd92bb41f306551cd8f4b947fe622934

    • SSDEEP

      98304:XM5qOMDIlsxIfmIoKw9+qpTSQPGs5A+7hyzGl/85Q9Gk:c5mDIeIeEtZE7hyzGV8Vk

    Score
    7/10
    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks