General

  • Target

    015893103a16ab984c491180a53e7319.apk

  • Size

    606KB

  • Sample

    230503-nq5ysagd51

  • MD5

    015893103a16ab984c491180a53e7319

  • SHA1

    98d89b68c01c492b860e17da69c1a4aa9cd3bd2f

  • SHA256

    2a78ef24571a66f16f0f153400ad518473513452a4e36c082e20fc59bba677da

  • SHA512

    6d936fa0a1d0c54587ca137db88e0817b16473ed22f398a76291db8d61a46ff4dffb2ffd7ce1b71037614597b81f023f311487b2570a1c28766b985610fb83bf

  • SSDEEP

    12288:hu94/jl6MSNyT1Rrx/N9yEFiZkXSbqlwoDyAn+MmkRcptU6Hj:hm4RSNI1xiMiZkXSO9Nn+MotUIj

Malware Config

Targets

    • Target

      015893103a16ab984c491180a53e7319.apk

    • Size

      606KB

    • MD5

      015893103a16ab984c491180a53e7319

    • SHA1

      98d89b68c01c492b860e17da69c1a4aa9cd3bd2f

    • SHA256

      2a78ef24571a66f16f0f153400ad518473513452a4e36c082e20fc59bba677da

    • SHA512

      6d936fa0a1d0c54587ca137db88e0817b16473ed22f398a76291db8d61a46ff4dffb2ffd7ce1b71037614597b81f023f311487b2570a1c28766b985610fb83bf

    • SSDEEP

      12288:hu94/jl6MSNyT1Rrx/N9yEFiZkXSbqlwoDyAn+MmkRcptU6Hj:hm4RSNI1xiMiZkXSO9Nn+MotUIj

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks