General

  • Target

    com.zetacron.iptv.apk

  • Size

    7.1MB

  • Sample

    221129-txsvpaef67

  • MD5

    46780d2454e31a55bd5738667b0a0232

  • SHA1

    c49ebee0c97e4de75185aa74f94659914eb4960c

  • SHA256

    cae5e699db09bc743205952bb208ed827d7837e6a4b40dd316f7a3cdc7467943

  • SHA512

    4f157d0b2b6044bece27f178ce157ff2d0a98c08aab8479c02588fcef252b1206c884fef54c6e2c27766e3d628f40707f1302eb384a41df1fa77b980fe39407e

  • SSDEEP

    196608:S/zsuPQbdzK/i5I1drpIIx5R6XL4XVJi+IKz5tajt:S/PQsB1dFIIvR6AJi+IKz5Y

Malware Config

Targets

    • Target

      com.zetacron.iptv.apk

    • Size

      7.1MB

    • MD5

      46780d2454e31a55bd5738667b0a0232

    • SHA1

      c49ebee0c97e4de75185aa74f94659914eb4960c

    • SHA256

      cae5e699db09bc743205952bb208ed827d7837e6a4b40dd316f7a3cdc7467943

    • SHA512

      4f157d0b2b6044bece27f178ce157ff2d0a98c08aab8479c02588fcef252b1206c884fef54c6e2c27766e3d628f40707f1302eb384a41df1fa77b980fe39407e

    • SSDEEP

      196608:S/zsuPQbdzK/i5I1drpIIx5R6XL4XVJi+IKz5tajt:S/PQsB1dFIIvR6AJi+IKz5Y

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks