General

  • Target

    94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502

  • Size

    955KB

  • Sample

    221127-hkr7vafh46

  • MD5

    9385a478eda117bb19027fa7460e74db

  • SHA1

    3d6b93260d35014282bd51af68ddf83d9155d7a1

  • SHA256

    94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502

  • SHA512

    b1bd7a4bd3c971f4c6b33d0ca2868151fa0ca757cb55d88c65d3e6237c8b48578351b43e7458b9749ab281616a89a1233f29e10d41a3fbb347ce54f3f3f016a5

  • SSDEEP

    24576:N4mAw8SEwvrgKVKG/5IGQYQBuRSqdnuZ8uC4Z:Naw8bOrhIGAZ8ut

Malware Config

Targets

    • Target

      94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502

    • Size

      955KB

    • MD5

      9385a478eda117bb19027fa7460e74db

    • SHA1

      3d6b93260d35014282bd51af68ddf83d9155d7a1

    • SHA256

      94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502

    • SHA512

      b1bd7a4bd3c971f4c6b33d0ca2868151fa0ca757cb55d88c65d3e6237c8b48578351b43e7458b9749ab281616a89a1233f29e10d41a3fbb347ce54f3f3f016a5

    • SSDEEP

      24576:N4mAw8SEwvrgKVKG/5IGQYQBuRSqdnuZ8uC4Z:Naw8bOrhIGAZ8ut

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks