General

  • Target

    SharkBot (13).apk

  • Size

    15.7MB

  • Sample

    221124-jyaemadc7w

  • MD5

    b0dde80553c8fe3827b6839117873450

  • SHA1

    8e4a2f32f4416f7a83fa3fb1be0e33ee476db856

  • SHA256

    218c6e2327c8342192dc58c6e793fc3d5cba7f15e4b2f188c98cd4ba48bf244a

  • SHA512

    b06e1ebd8ae5594e4a738d1f74ab13f4b9854783a35424a6a005605055c78eae8afcd756af3defbbb73854c5c176bf02b862cf12a7366f771ce9b120ea9edcdc

  • SSDEEP

    393216:cHZUiBmacX7X52NWdXJq2TN5+dcwBpObrfum79:c5BqgY5oHOL9

Score
7/10

Malware Config

Targets

    • Target

      SharkBot (13).apk

    • Size

      15.7MB

    • MD5

      b0dde80553c8fe3827b6839117873450

    • SHA1

      8e4a2f32f4416f7a83fa3fb1be0e33ee476db856

    • SHA256

      218c6e2327c8342192dc58c6e793fc3d5cba7f15e4b2f188c98cd4ba48bf244a

    • SHA512

      b06e1ebd8ae5594e4a738d1f74ab13f4b9854783a35424a6a005605055c78eae8afcd756af3defbbb73854c5c176bf02b862cf12a7366f771ce9b120ea9edcdc

    • SSDEEP

      393216:cHZUiBmacX7X52NWdXJq2TN5+dcwBpObrfum79:c5BqgY5oHOL9

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks