General

  • Target

    Super Emoji Editor & Sticker_2.106.apk

  • Size

    28.6MB

  • Sample

    230114-r7wcfsdd5t

  • MD5

    a0ce07ddf340686e205df4d0df19cbc7

  • SHA1

    f0a80734b5d57b9b2035eb974c710b5984413616

  • SHA256

    8b0d84136b1f3219b1bcaa18d58942ab766d2bac4d41939592b57aacb24b2f07

  • SHA512

    01bf1d4558ac315965a637d7c8f0362ae34bfcb3386112c229830409aa62f6e2757879c1f0cefce690f603816a0eebc61fd5a01a4b92d497e0d24451cf9c0490

  • SSDEEP

    786432:dLumVhgR40MO7urgpoGD67l0ytRDS8L7dftFh:diU0P3urgpoGD80ytRm8L7xvh

Malware Config

Extracted

Family

harly

C2

https://log.gfduytsdf.shop

Targets

    • Target

      Super Emoji Editor & Sticker_2.106.apk

    • Size

      28.6MB

    • MD5

      a0ce07ddf340686e205df4d0df19cbc7

    • SHA1

      f0a80734b5d57b9b2035eb974c710b5984413616

    • SHA256

      8b0d84136b1f3219b1bcaa18d58942ab766d2bac4d41939592b57aacb24b2f07

    • SHA512

      01bf1d4558ac315965a637d7c8f0362ae34bfcb3386112c229830409aa62f6e2757879c1f0cefce690f603816a0eebc61fd5a01a4b92d497e0d24451cf9c0490

    • SSDEEP

      786432:dLumVhgR40MO7urgpoGD67l0ytRDS8L7dftFh:diU0P3urgpoGD80ytRm8L7xvh

    • Harly

      Harly is an Android trojan subscriber first seen in September 2022.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks