General

  • Target

    inem-sellar.apk

  • Size

    6.2MB

  • Sample

    221102-p1rdtacfem

  • MD5

    1be9bdc47f4405150b807fa2adc28ba6

  • SHA1

    07908f550e657037437b49b1b6bee8905ecf30e4

  • SHA256

    1c80968966343fc3fafccb1a4985066fccc45535f2f00ea133554c58c04040cc

  • SHA512

    f90eb265c624b0608f21ee685003d0c68067439ae8515a6ed064dacdf9277d51dd59e0a563d664d71bbb4a2a29cec601ed0ab86cf4ba90996a165f2f96d1a3c3

  • SSDEEP

    196608:7WJ/2W2TxT86xTITiSLaBWognw2bkWSt9q2s4:iJ+W29I6xEOSLgW9b2v

Malware Config

Targets

    • Target

      inem-sellar.apk

    • Size

      6.2MB

    • MD5

      1be9bdc47f4405150b807fa2adc28ba6

    • SHA1

      07908f550e657037437b49b1b6bee8905ecf30e4

    • SHA256

      1c80968966343fc3fafccb1a4985066fccc45535f2f00ea133554c58c04040cc

    • SHA512

      f90eb265c624b0608f21ee685003d0c68067439ae8515a6ed064dacdf9277d51dd59e0a563d664d71bbb4a2a29cec601ed0ab86cf4ba90996a165f2f96d1a3c3

    • SSDEEP

      196608:7WJ/2W2TxT86xTITiSLaBWognw2bkWSt9q2s4:iJ+W29I6xEOSLgW9b2v

    Score
    7/10
    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks