General

  • Target

    SharkBot (5).apk

  • Size

    14.2MB

  • Sample

    221124-jw54hsdc21

  • MD5

    6d44228b398f343c23c09e439317ff47

  • SHA1

    ab7ebce9e3f7ea771700e55bf1a0551754bd4878

  • SHA256

    b4a031c10801de4e89d7d66f26824d9066c4c217c06386dc102a08c26a81d4f0

  • SHA512

    7061671848c8a2e1831a5ab4d2cb6a20f082f6dc9f6e5fbf5cdb6d35ac282b0ca2cf24f0b44872550920ed96c9bfb2d3737d79277f8e1659142a91820f5a17dd

  • SSDEEP

    393216:iffBgn5macX7X52NWdXJq2TNJTXwUpsrfum7j:qg5qgY5ySKj

Malware Config

Extracted

Family

sharkbot

C2

http://statscodicefiscale.xyz/stats/

Targets

    • Target

      SharkBot (5).apk

    • Size

      14.2MB

    • MD5

      6d44228b398f343c23c09e439317ff47

    • SHA1

      ab7ebce9e3f7ea771700e55bf1a0551754bd4878

    • SHA256

      b4a031c10801de4e89d7d66f26824d9066c4c217c06386dc102a08c26a81d4f0

    • SHA512

      7061671848c8a2e1831a5ab4d2cb6a20f082f6dc9f6e5fbf5cdb6d35ac282b0ca2cf24f0b44872550920ed96c9bfb2d3737d79277f8e1659142a91820f5a17dd

    • SSDEEP

      393216:iffBgn5macX7X52NWdXJq2TNJTXwUpsrfum7j:qg5qgY5ySKj

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks