General

  • Target

    chrome.apk

  • Size

    277KB

  • Sample

    230206-awrfpaeh3x

  • MD5

    cf704d6b0ec8351e403c1bb5abb47d0d

  • SHA1

    c5010bbb27741a6136e2e6bb6cd9a77ad5404ecc

  • SHA256

    1526ce6aa629ae1fbd763cd4e36e13d31e0e8ed0a2947812e670afb2089d886a

  • SHA512

    e759bcebf576d01901b15c72b8fb9c3c039792b9231f975a30b4a7f28dd07fe3e0e376ecb25f76143f2052f6e0297e921465e62823c1a7345ced0b759f729302

  • SSDEEP

    6144:K62sPC+1iD1gZKpoyIzXR9tFe3mK5tVfHrcxqXiTU/4hWAZ80jmjIEQ:ksPC+AGcIzBNeWK5thLcx4i4nAHjU+

Malware Config

Targets

    • Target

      chrome.apk

    • Size

      277KB

    • MD5

      cf704d6b0ec8351e403c1bb5abb47d0d

    • SHA1

      c5010bbb27741a6136e2e6bb6cd9a77ad5404ecc

    • SHA256

      1526ce6aa629ae1fbd763cd4e36e13d31e0e8ed0a2947812e670afb2089d886a

    • SHA512

      e759bcebf576d01901b15c72b8fb9c3c039792b9231f975a30b4a7f28dd07fe3e0e376ecb25f76143f2052f6e0297e921465e62823c1a7345ced0b759f729302

    • SSDEEP

      6144:K62sPC+1iD1gZKpoyIzXR9tFe3mK5tVfHrcxqXiTU/4hWAZ80jmjIEQ:ksPC+AGcIzBNeWK5thLcx4i4nAHjU+

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks