General

  • Target

    Truecaller_v13.6.4-MD-arm64.apk

  • Size

    76.7MB

  • Sample

    230302-fcpewabb5z

  • MD5

    3385773c615affb24f66c5894f257bbc

  • SHA1

    a6a57fa162e552f011970a5a01c2a1450a5ae4f3

  • SHA256

    ae895f723043c99ebd9d49a8155e8166ca914a4af0fbb0b5ba4a80eead699025

  • SHA512

    2f0c8f070aa01e5d17e16344241c2275a5294c948b20b0cbd13445f76316c3e421f72206f6e42ef2a3ab8b60f5de4a02a34da00ab973aa70453779bbaaf6a8d6

  • SSDEEP

    1572864:O27ZJvxXJHk0wxSm62Qvv9gNCDUS3LJn++bUZWYvHMcQCxwvk4dN:Xd19Rk0wxbQ9cQUS3LBzKTvHrQ2wvkGN

Score
7/10

Malware Config

Targets

    • Target

      Truecaller_v13.6.4-MD-arm64.apk

    • Size

      76.7MB

    • MD5

      3385773c615affb24f66c5894f257bbc

    • SHA1

      a6a57fa162e552f011970a5a01c2a1450a5ae4f3

    • SHA256

      ae895f723043c99ebd9d49a8155e8166ca914a4af0fbb0b5ba4a80eead699025

    • SHA512

      2f0c8f070aa01e5d17e16344241c2275a5294c948b20b0cbd13445f76316c3e421f72206f6e42ef2a3ab8b60f5de4a02a34da00ab973aa70453779bbaaf6a8d6

    • SSDEEP

      1572864:O27ZJvxXJHk0wxSm62Qvv9gNCDUS3LJn++bUZWYvHMcQCxwvk4dN:Xd19Rk0wxbQ9cQUS3LBzKTvHrQ2wvkGN

    Score
    7/10
    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks