General

  • Target

    jacksmith.comweli.blacksmith-v1.0-APPPARAPC.com.apk

  • Size

    2.2MB

  • Sample

    230504-ymwk2seg97

  • MD5

    cb79652316b77155e1a07072e850517b

  • SHA1

    12b2cf8b5c4a798630a9b3262fafb17340c7b573

  • SHA256

    d8ded6e2363564c9498262b96c63e8e2c994e7b624712ccc6b0efab44a9369d0

  • SHA512

    29469c72fa72bdcff9d890e93418cf424aa2dc7adfeaaaa1c73d6639f4b649e51ea12b4262424ebec08a23a88f37e82a6fa28854e04547451570f3a904acf858

  • SSDEEP

    49152:u4OF8HArWjJPm6rrldjYnpkFwW/QlYkzuHK2zdPLEohdgyijRz:u4ODrseubjypkFwhY4uHKEYofG

Malware Config

Targets

    • Target

      jacksmith.comweli.blacksmith-v1.0-APPPARAPC.com.apk

    • Size

      2.2MB

    • MD5

      cb79652316b77155e1a07072e850517b

    • SHA1

      12b2cf8b5c4a798630a9b3262fafb17340c7b573

    • SHA256

      d8ded6e2363564c9498262b96c63e8e2c994e7b624712ccc6b0efab44a9369d0

    • SHA512

      29469c72fa72bdcff9d890e93418cf424aa2dc7adfeaaaa1c73d6639f4b649e51ea12b4262424ebec08a23a88f37e82a6fa28854e04547451570f3a904acf858

    • SSDEEP

      49152:u4OF8HArWjJPm6rrldjYnpkFwW/QlYkzuHK2zdPLEohdgyijRz:u4ODrseubjypkFwhY4uHKEYofG

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks