General

  • Target

    Loco Slots Tombola Bingo Live_2023.0.0_Apkpure.apk

  • Size

    85.2MB

  • Sample

    230204-rbh29agg9s

  • MD5

    6031a5604ddbe0ce3f0d2817b4c226ae

  • SHA1

    8b0ef632fcb7a20a3dcfe233b5a7625ff595f831

  • SHA256

    725a99daa5de965821adef68ae4763156b152246107ba12b33d8d32a0abda869

  • SHA512

    0a36e2408f8462487d035a3493083e960380679afc343d214b15d251408133994da86e91fbed7c25dcdcd805b3f8199c1439441f8f8c39af32558355dd0445fa

  • SSDEEP

    1572864:V3PScmYi0fdhqrArX4XcP6cF+6UcJPr/w9fjUJrz7cRjNzPo00ak1uK6:V3PS7Yi0fdaAroXK6cFz9Jr/aoJjsjNL

Malware Config

Targets

    • Target

      Loco Slots Tombola Bingo Live_2023.0.0_Apkpure.apk

    • Size

      85.2MB

    • MD5

      6031a5604ddbe0ce3f0d2817b4c226ae

    • SHA1

      8b0ef632fcb7a20a3dcfe233b5a7625ff595f831

    • SHA256

      725a99daa5de965821adef68ae4763156b152246107ba12b33d8d32a0abda869

    • SHA512

      0a36e2408f8462487d035a3493083e960380679afc343d214b15d251408133994da86e91fbed7c25dcdcd805b3f8199c1439441f8f8c39af32558355dd0445fa

    • SSDEEP

      1572864:V3PScmYi0fdhqrArX4XcP6cF+6UcJPr/w9fjUJrz7cRjNzPo00ak1uK6:V3PS7Yi0fdaAroXK6cFz9Jr/aoJjsjNL

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks