General

  • Target

    SharkBot (12).apk

  • Size

    15.7MB

  • Sample

    221124-jxq1zsdc5y

  • MD5

    b87fea08d3fd6f9d0a4a46b18b5b3f8e

  • SHA1

    9d54231e93035fcde45851fcf26795d8fe366a7a

  • SHA256

    844efceeeeff73da35ac13c217ad5723c456ecec01fada7f92b9203fc29e7dcd

  • SHA512

    9c578e637a81c52a32a208d90ccf99ee63693c80278309115450f21427fe9b33c2f5fc0a0a1a9b649d08fe01e73663f2aa28b8311bdb95f65b3eed72f125f3f8

  • SSDEEP

    393216:v4irHAeHcBmacX7X52NWdXJq2TN51XcwnpObrfum7m:lg2CqgY5NpOLm

Score
7/10

Malware Config

Targets

    • Target

      SharkBot (12).apk

    • Size

      15.7MB

    • MD5

      b87fea08d3fd6f9d0a4a46b18b5b3f8e

    • SHA1

      9d54231e93035fcde45851fcf26795d8fe366a7a

    • SHA256

      844efceeeeff73da35ac13c217ad5723c456ecec01fada7f92b9203fc29e7dcd

    • SHA512

      9c578e637a81c52a32a208d90ccf99ee63693c80278309115450f21427fe9b33c2f5fc0a0a1a9b649d08fe01e73663f2aa28b8311bdb95f65b3eed72f125f3f8

    • SSDEEP

      393216:v4irHAeHcBmacX7X52NWdXJq2TN51XcwnpObrfum7m:lg2CqgY5NpOLm

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks