Resubmissions

02-02-2023 06:45

230202-hjc2jafd29 7

General

  • Target

    PayJoy.apk

  • Size

    5.9MB

  • Sample

    230202-hjc2jafd29

  • MD5

    23eba8c0077e1246762caeec3420848e

  • SHA1

    589663fbc2bd17171e42a83b96f0e28b9e80f2db

  • SHA256

    5f81322a2035ab07f973aff41cdebc0b34c7d2a4dc6472374318c09d3abfde22

  • SHA512

    f70c750e0a04f21582c5137b47905a92fd2658dcc3ba0238ae1d85478762285a9cfabe747c785a2c2923a78a940a11fadbb9137aa83046c9f1cec0a2f9edf600

  • SSDEEP

    98304:gTcnWjXJ5tC2zDrhJo+S6Wg8fmrgTVt7HRf0MKUP1Uq2AQn2ofra8ZEjb:jWN22zDrZV8fmr4R6KUq2TuP

Malware Config

Targets

    • Target

      PayJoy.apk

    • Size

      5.9MB

    • MD5

      23eba8c0077e1246762caeec3420848e

    • SHA1

      589663fbc2bd17171e42a83b96f0e28b9e80f2db

    • SHA256

      5f81322a2035ab07f973aff41cdebc0b34c7d2a4dc6472374318c09d3abfde22

    • SHA512

      f70c750e0a04f21582c5137b47905a92fd2658dcc3ba0238ae1d85478762285a9cfabe747c785a2c2923a78a940a11fadbb9137aa83046c9f1cec0a2f9edf600

    • SSDEEP

      98304:gTcnWjXJ5tC2zDrhJo+S6Wg8fmrgTVt7HRf0MKUP1Uq2AQn2ofra8ZEjb:jWN22zDrZV8fmr4R6KUq2TuP

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks