General

  • Target

    AngerOfStick5.v.1.1.78.b.188.crk.Support.apk

  • Size

    41.4MB

  • Sample

    230203-ghtgfseg8z

  • MD5

    922aab392721fd2a97ea6e0d7c79c829

  • SHA1

    2656874363d6b117b8883fba8f03927819bd0853

  • SHA256

    2b304b150c52e57a7992bacc4e1da0c42209552f397a36e41a34ed98e34ef02a

  • SHA512

    28d5f69318298819b3b47ab23e75a74210fd1a272db291f3b57ec9c2d8d94809ae398d695d2aef437911f9b920046a6fb887320c2268a724180a11cc0e401fb1

  • SSDEEP

    786432:DPSvKSmqj3dNh9hbWC+7W6VhGFFsagGGBqfRXNY1+mBhgfnpsD95np4PU:DPSiSJjtzWC+75fGLs6GBqpXO8puHpiU

Malware Config

Targets

    • Target

      AngerOfStick5.v.1.1.78.b.188.crk.Support.apk

    • Size

      41.4MB

    • MD5

      922aab392721fd2a97ea6e0d7c79c829

    • SHA1

      2656874363d6b117b8883fba8f03927819bd0853

    • SHA256

      2b304b150c52e57a7992bacc4e1da0c42209552f397a36e41a34ed98e34ef02a

    • SHA512

      28d5f69318298819b3b47ab23e75a74210fd1a272db291f3b57ec9c2d8d94809ae398d695d2aef437911f9b920046a6fb887320c2268a724180a11cc0e401fb1

    • SSDEEP

      786432:DPSvKSmqj3dNh9hbWC+7W6VhGFFsagGGBqfRXNY1+mBhgfnpsD95np4PU:DPSiSJjtzWC+75fGLs6GBqpXO8puHpiU

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks