General

  • Target

    jiomart_signed-avlp7d2x3gcjqjbw-3-AVLPayb12yTGl80D.apk

  • Size

    10.3MB

  • Sample

    230328-pe9chace7y

  • MD5

    4d1767da11cc44c3caffc6f7f7b42d91

  • SHA1

    9265e4e0f7888fa3a8112744fdf4fdcdbd186aa4

  • SHA256

    203171d39a081c7a2f3bd25b6b6e5ea69550292a75cc042d6daf35f02de98dc9

  • SHA512

    cb18ffb61280ef1a44cbd3ac582add4dcd177378a12d33b75e22ec6bb712fac7906925b19d4c0816cee2aefaf367448fb7955e65972135ed255c7574835fdfb6

  • SSDEEP

    196608:eI32MZzdBpoqlvSOwswAZcZmmlW53dSouO6JHHaMR8gUAPw3tuhIJ:pPqbOwrVng3oouhLRZUBtF

Score
7/10

Malware Config

Targets

    • Target

      jiomart_signed-avlp7d2x3gcjqjbw-3-AVLPayb12yTGl80D.apk

    • Size

      10.3MB

    • MD5

      4d1767da11cc44c3caffc6f7f7b42d91

    • SHA1

      9265e4e0f7888fa3a8112744fdf4fdcdbd186aa4

    • SHA256

      203171d39a081c7a2f3bd25b6b6e5ea69550292a75cc042d6daf35f02de98dc9

    • SHA512

      cb18ffb61280ef1a44cbd3ac582add4dcd177378a12d33b75e22ec6bb712fac7906925b19d4c0816cee2aefaf367448fb7955e65972135ed255c7574835fdfb6

    • SSDEEP

      196608:eI32MZzdBpoqlvSOwswAZcZmmlW53dSouO6JHHaMR8gUAPw3tuhIJ:pPqbOwrVng3oouhLRZUBtF

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks