General

  • Target

    SKULLGIRLS-MOD-APK-5.2.1.apk

  • Size

    111.5MB

  • Sample

    230211-dss2wsgh5z

  • MD5

    8c4afba35249e93c5e7ba8c4534f163f

  • SHA1

    f16986382f4e79c69ae4bcca0219d46802ffb348

  • SHA256

    de01b29672ba0fccc59ca36bbd7fd85403aaece86f9f85893ffb7264e405f885

  • SHA512

    43b808225565548f3d563f59add3778defdd713282c45706f53bf5bf6e205a838fc4dfc55edf88b70b4aac7d4d7bdff8133cdf90a78d8c60938383ecd8b1ae36

  • SSDEEP

    3145728:XSXNRnGSXIQK71eNeb/2C9Gi0ZIpbKPXP4PD6p0mEFO6XgaEa:XSdJJu1gw/2Ti+AwwPOOt5Jb

Score
7/10

Malware Config

Targets

    • Target

      SKULLGIRLS-MOD-APK-5.2.1.apk

    • Size

      111.5MB

    • MD5

      8c4afba35249e93c5e7ba8c4534f163f

    • SHA1

      f16986382f4e79c69ae4bcca0219d46802ffb348

    • SHA256

      de01b29672ba0fccc59ca36bbd7fd85403aaece86f9f85893ffb7264e405f885

    • SHA512

      43b808225565548f3d563f59add3778defdd713282c45706f53bf5bf6e205a838fc4dfc55edf88b70b4aac7d4d7bdff8133cdf90a78d8c60938383ecd8b1ae36

    • SSDEEP

      3145728:XSXNRnGSXIQK71eNeb/2C9Gi0ZIpbKPXP4PD6p0mEFO6XgaEa:XSdJJu1gw/2Ti+AwwPOOt5Jb

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks