General

  • Target

    SharkBot (4).apk

  • Size

    13.5MB

  • Sample

    221124-jw5sraac83

  • MD5

    fbbce12a67330ab04ae6f774e71a8f24

  • SHA1

    54334b07761041f00953cb0048a5b1ef96b6fdc1

  • SHA256

    7f55dddcfad05403f71580ec2e5acafdc8c9555e72f724eb1f9e37bf09b8cc0c

  • SHA512

    e1dfe3a9c023290de819aa93e2835cca1acaeada3959c99efce2eac4cea8e734e7ce6aaf019002c49d31d1ea1215c753304e7ce8da383e5243681953d0017c5d

  • SSDEEP

    393216:BH5macX7X52NWdXJq2TNhMfw6zpMrfum7H:BZqgY5b2qH

Malware Config

Extracted

Family

sharkbot

C2

http://statscodicefiscale.xyz/stats/

Targets

    • Target

      SharkBot (4).apk

    • Size

      13.5MB

    • MD5

      fbbce12a67330ab04ae6f774e71a8f24

    • SHA1

      54334b07761041f00953cb0048a5b1ef96b6fdc1

    • SHA256

      7f55dddcfad05403f71580ec2e5acafdc8c9555e72f724eb1f9e37bf09b8cc0c

    • SHA512

      e1dfe3a9c023290de819aa93e2835cca1acaeada3959c99efce2eac4cea8e734e7ce6aaf019002c49d31d1ea1215c753304e7ce8da383e5243681953d0017c5d

    • SSDEEP

      393216:BH5macX7X52NWdXJq2TNhMfw6zpMrfum7H:BZqgY5b2qH

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks