General

  • Target

    0cdb0a025599b2b4a3820e74b2f6c812.apk

  • Size

    14.7MB

  • Sample

    230110-cvfznshg44

  • MD5

    0cdb0a025599b2b4a3820e74b2f6c812

  • SHA1

    10e77e549348a21680fb7245244cb0740fe3388b

  • SHA256

    092d86e6fba60df1cdb19790418199d3f37e5bd8461e6202237633457c2b138a

  • SHA512

    ff4a76696171af0fce0bd0b69086005b348cea88b44d4ca37d55a2e70ab5a31c4ed52e163625d2c8ef503e92aa826d6b671ef316acb547b59bc780b781671dfa

  • SSDEEP

    393216:91FUy7jQuIqK9KD/xDVrAxXl5TyDVjfQZzskDIw:9PUkTvD/xDV0ZlUVbQZzWw

Score
7/10

Malware Config

Targets

    • Target

      0cdb0a025599b2b4a3820e74b2f6c812.apk

    • Size

      14.7MB

    • MD5

      0cdb0a025599b2b4a3820e74b2f6c812

    • SHA1

      10e77e549348a21680fb7245244cb0740fe3388b

    • SHA256

      092d86e6fba60df1cdb19790418199d3f37e5bd8461e6202237633457c2b138a

    • SHA512

      ff4a76696171af0fce0bd0b69086005b348cea88b44d4ca37d55a2e70ab5a31c4ed52e163625d2c8ef503e92aa826d6b671ef316acb547b59bc780b781671dfa

    • SSDEEP

      393216:91FUy7jQuIqK9KD/xDVrAxXl5TyDVjfQZzskDIw:9PUkTvD/xDV0ZlUVbQZzWw

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks