General

  • Target

    SharkBot (16).apk

  • Size

    14.9MB

  • Sample

    221124-jyb88adc8t

  • MD5

    dae48773e7003fe8e86ed4216bae2727

  • SHA1

    54bcf3864770397a2ea3459e050d8766c0bea1cf

  • SHA256

    fa7947933a3561b7174f1d94472dcf8633a03749c14342ce65dafe94db361140

  • SHA512

    05176fff264e33a867b0169789030e94e38968ee23d4356f0c05c387889c89156cb8cc5753ad5b2362b0aad3cc7bf19c16ddac527eff3cd8981dcbc6cd383afc

  • SSDEEP

    393216:E5eWG+vt+Y/BmacX7X52NWdXJq2TN2ydDwzpGrfum7F:WIEt+KqgY5MVcF

Malware Config

Targets

    • Target

      SharkBot (16).apk

    • Size

      14.9MB

    • MD5

      dae48773e7003fe8e86ed4216bae2727

    • SHA1

      54bcf3864770397a2ea3459e050d8766c0bea1cf

    • SHA256

      fa7947933a3561b7174f1d94472dcf8633a03749c14342ce65dafe94db361140

    • SHA512

      05176fff264e33a867b0169789030e94e38968ee23d4356f0c05c387889c89156cb8cc5753ad5b2362b0aad3cc7bf19c16ddac527eff3cd8981dcbc6cd383afc

    • SSDEEP

      393216:E5eWG+vt+Y/BmacX7X52NWdXJq2TN2ydDwzpGrfum7F:WIEt+KqgY5MVcF

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks