General

  • Target

    omada-release (1).apk

  • Size

    161.3MB

  • Sample

    230423-p1ep1sfa4x

  • MD5

    67365696c31262656f6606efe7b4d8e8

  • SHA1

    43f6037cbcb69f7f7d3e80d9d189a878a3c50547

  • SHA256

    52440cd1d21a55b9b7eeaee2c2ee8b745a3daacd5c3da291ec5290b76d8ca4bc

  • SHA512

    fe65781b68acc16de39c8bcd7c66c3b95b9bc2263804a73db5f4285e60c5e4bc502736dd45367e01f0c6b90cafb1a4f8efe460213a9d61d705dc7565d061f27b

  • SSDEEP

    3145728:aAO2w5v5wv5Ntp31NA8Ean6FnsI4KgJEXXHcYOjqmyYnginjx:65hwv5Ntp31NHEanisI4KDHgbyYPnjx

Score
7/10

Malware Config

Targets

    • Target

      omada-release (1).apk

    • Size

      161.3MB

    • MD5

      67365696c31262656f6606efe7b4d8e8

    • SHA1

      43f6037cbcb69f7f7d3e80d9d189a878a3c50547

    • SHA256

      52440cd1d21a55b9b7eeaee2c2ee8b745a3daacd5c3da291ec5290b76d8ca4bc

    • SHA512

      fe65781b68acc16de39c8bcd7c66c3b95b9bc2263804a73db5f4285e60c5e4bc502736dd45367e01f0c6b90cafb1a4f8efe460213a9d61d705dc7565d061f27b

    • SSDEEP

      3145728:aAO2w5v5wv5Ntp31NA8Ean6FnsI4KgJEXXHcYOjqmyYnginjx:65hwv5Ntp31NHEanisI4KDHgbyYPnjx

    Score
    7/10
    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks