General

  • Target

    prog.apk

  • Size

    20.6MB

  • Sample

    221104-drbq8acfbr

  • MD5

    028705f60306649e4c70ce2c7068cc2d

  • SHA1

    462e73885baa5963ae579627c99fd21eae335f95

  • SHA256

    f36123a88a929683a1046674be36a9d680385b833d8fab03804f8001dd64598c

  • SHA512

    fbd4e5f5baeaa5ef95bb1042e19fa428d99c305a75d9211cb495caf6503631d9bdadf8618d2557a7a6851023c2a4bf922d3e65be28fbe3270eaae949bde261fc

  • SSDEEP

    393216:ztz8FO7TnsJA35z7A79L+oAn1mbgafiubciZPbxT9i/zVN2I+TXmdwKpPbNiRSK/:Zz8FaTsJA35z7c5K1mbBffc4Pbi/zVNg

Score
8/10

Malware Config

Targets

    • Target

      prog.apk

    • Size

      20.6MB

    • MD5

      028705f60306649e4c70ce2c7068cc2d

    • SHA1

      462e73885baa5963ae579627c99fd21eae335f95

    • SHA256

      f36123a88a929683a1046674be36a9d680385b833d8fab03804f8001dd64598c

    • SHA512

      fbd4e5f5baeaa5ef95bb1042e19fa428d99c305a75d9211cb495caf6503631d9bdadf8618d2557a7a6851023c2a4bf922d3e65be28fbe3270eaae949bde261fc

    • SSDEEP

      393216:ztz8FO7TnsJA35z7A79L+oAn1mbgafiubciZPbxT9i/zVN2I+TXmdwKpPbNiRSK/:Zz8FaTsJA35z7c5K1mbBffc4Pbi/zVNg

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks