General

  • Target

    app.apk

  • Size

    5.1MB

  • Sample

    230210-3115xacf8y

  • MD5

    d54f3add114218dcc9749610bbdde2dd

  • SHA1

    1a4a3466d53c1e6b44a55ccdc753cc4609d813a9

  • SHA256

    d85fb9d711667ce8cff8ec0cff14149276b353ff0eaf3e777736a181c9ff4c81

  • SHA512

    e833cce50339c80c08a00770a1da640e318517ea6a1d457bf374562439d2f4e0f94588addf48db8cb07571593e2d101609e5f83243001e5cfac639cfb715ef93

  • SSDEEP

    98304:0mD/+fvKJZFaG593gQ4vPiCwJNy4Wn9+zwsYK2asFzwmu+4ES+ika4R64yhsOt:0SGvKbFaG/dbJNxW99basFG4A4Pk

Malware Config

Targets

    • Target

      app.apk

    • Size

      5.1MB

    • MD5

      d54f3add114218dcc9749610bbdde2dd

    • SHA1

      1a4a3466d53c1e6b44a55ccdc753cc4609d813a9

    • SHA256

      d85fb9d711667ce8cff8ec0cff14149276b353ff0eaf3e777736a181c9ff4c81

    • SHA512

      e833cce50339c80c08a00770a1da640e318517ea6a1d457bf374562439d2f4e0f94588addf48db8cb07571593e2d101609e5f83243001e5cfac639cfb715ef93

    • SSDEEP

      98304:0mD/+fvKJZFaG593gQ4vPiCwJNy4Wn9+zwsYK2asFzwmu+4ES+ika4R64yhsOt:0SGvKbFaG/dbJNxW99basFG4A4Pk

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks