General

  • Target

    org.codespark.thefoos-2230800.apk

  • Size

    87.5MB

  • Sample

    230327-l48kqach27

  • MD5

    3f9eed7f8c288b8ca39c38017456f0b9

  • SHA1

    be7f3e37e35ba5c3f73e19d6a2d89af2f5ca4f23

  • SHA256

    40fbdfe1b133f0f08a6c7ed7a97e380b4ddb61c254c29b9672456982d640aa4f

  • SHA512

    6a7015fe42261941dc0ce5546f6d624c7b2bfe9fef8beedd158ee22e65a4b40cc020ad22a695ade5a77d8f6834373bff81827d841c77bc0c1efa5cce3889dc3f

  • SSDEEP

    1572864:VppUHNYQ9HcUYd5GrVi58Cae2kLLNjaUHHbDt0mR8NLhtnpqHHlmnYnWK85R0C3:VppUtYQCLAVU8CaepxjdHVH6tPywnG8z

Score
7/10

Malware Config

Targets

    • Target

      org.codespark.thefoos-2230800.apk

    • Size

      87.5MB

    • MD5

      3f9eed7f8c288b8ca39c38017456f0b9

    • SHA1

      be7f3e37e35ba5c3f73e19d6a2d89af2f5ca4f23

    • SHA256

      40fbdfe1b133f0f08a6c7ed7a97e380b4ddb61c254c29b9672456982d640aa4f

    • SHA512

      6a7015fe42261941dc0ce5546f6d624c7b2bfe9fef8beedd158ee22e65a4b40cc020ad22a695ade5a77d8f6834373bff81827d841c77bc0c1efa5cce3889dc3f

    • SSDEEP

      1572864:VppUHNYQ9HcUYd5GrVi58Cae2kLLNjaUHHbDt0mR8NLhtnpqHHlmnYnWK85R0C3:VppUtYQCLAVU8CaepxjdHVH6tPywnG8z

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks