General

  • Target

    minecraft-pe-v1.17.10.04.apk

  • Size

    123.2MB

  • Sample

    230203-s1612sbd9w

  • MD5

    8d47e2db4279c5192c9d4c7acc944be6

  • SHA1

    d47b5b5d3fd2c6a01aa32a465c0490a96ff85791

  • SHA256

    2746d66f747af754d4fff25970c6300cbcefc4a9af4a532539b3b408cc0cebef

  • SHA512

    d00afe7a9dbbbd546df0ff194125255464b25a53ded8298ddea58ab2e80c85f4b95a7ccd8c71b4e2f2372a3e0e1224a15f41ca60a99dc0480ca127dbc3cf6391

  • SSDEEP

    3145728:KzpV41s5EIZslw2JE6ktLChN8Lo1BlF6NY3Q9+:KzpS1sFKlwIDkcIL+bUYH

Malware Config

Targets

    • Target

      minecraft-pe-v1.17.10.04.apk

    • Size

      123.2MB

    • MD5

      8d47e2db4279c5192c9d4c7acc944be6

    • SHA1

      d47b5b5d3fd2c6a01aa32a465c0490a96ff85791

    • SHA256

      2746d66f747af754d4fff25970c6300cbcefc4a9af4a532539b3b408cc0cebef

    • SHA512

      d00afe7a9dbbbd546df0ff194125255464b25a53ded8298ddea58ab2e80c85f4b95a7ccd8c71b4e2f2372a3e0e1224a15f41ca60a99dc0480ca127dbc3cf6391

    • SSDEEP

      3145728:KzpV41s5EIZslw2JE6ktLChN8Lo1BlF6NY3Q9+:KzpS1sFKlwIDkcIL+bUYH

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks