General

  • Target

    crono-2-8-42.apk

  • Size

    26.6MB

  • Sample

    230202-1hfedabc8z

  • MD5

    5c13bfb988d2ce67d2fd246974a79142

  • SHA1

    32c3b313c393d6fee5500e3add16b1194e5b0253

  • SHA256

    920526f660eb90316901342d939c3610fa8e1b45941362496d46b3d1200b6e06

  • SHA512

    399f69e2307214bc1a4938834b71b5ac3a87a085f6dd855afad8cd5b34bbbf2ecfd477809d7ffd4671d4727295de20c3e7462e20c19161682e1024af79d061a8

  • SSDEEP

    786432:aBnXx+5eQ6dQzFsaGpzipQ1Uqi7G5W3Nm0CyR19trs:as/6uzFsaUzYSNWdm/yR1PQ

Score
7/10

Malware Config

Targets

    • Target

      crono-2-8-42.apk

    • Size

      26.6MB

    • MD5

      5c13bfb988d2ce67d2fd246974a79142

    • SHA1

      32c3b313c393d6fee5500e3add16b1194e5b0253

    • SHA256

      920526f660eb90316901342d939c3610fa8e1b45941362496d46b3d1200b6e06

    • SHA512

      399f69e2307214bc1a4938834b71b5ac3a87a085f6dd855afad8cd5b34bbbf2ecfd477809d7ffd4671d4727295de20c3e7462e20c19161682e1024af79d061a8

    • SSDEEP

      786432:aBnXx+5eQ6dQzFsaGpzipQ1Uqi7G5W3Nm0CyR19trs:as/6uzFsaUzYSNWdm/yR1PQ

    Score
    7/10
    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

    • Removes a system notification.

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks