General

  • Target

    35338e58becc1717f33ddeac452ca1a8.apk

  • Size

    8.7MB

  • Sample

    230516-hflt9sab9s

  • MD5

    35338e58becc1717f33ddeac452ca1a8

  • SHA1

    a2b287b6d656c5f7da626db11d6f3c947d24f610

  • SHA256

    78d46fe8dcb039b082e7552cb1c0e10fa4c28e30d15911c71a05e3ab5ed6199f

  • SHA512

    02a65029c603847dffaece2126852e4a496f8d505ac72733b0edeff4cb671ea7f96458914766ae64e7f108a8e3767bd022367d6667587ff1cea1658a0ba754d5

  • SSDEEP

    196608:yOFqan6gqBkCWWLXKNMpeRjO35+DsCWbkCqlNYYed5Wly6Rarz3:yOFf6hkXiXKNo3AsCWbkC2YYIW5arz3

Malware Config

Targets

    • Target

      35338e58becc1717f33ddeac452ca1a8.apk

    • Size

      8.7MB

    • MD5

      35338e58becc1717f33ddeac452ca1a8

    • SHA1

      a2b287b6d656c5f7da626db11d6f3c947d24f610

    • SHA256

      78d46fe8dcb039b082e7552cb1c0e10fa4c28e30d15911c71a05e3ab5ed6199f

    • SHA512

      02a65029c603847dffaece2126852e4a496f8d505ac72733b0edeff4cb671ea7f96458914766ae64e7f108a8e3767bd022367d6667587ff1cea1658a0ba754d5

    • SSDEEP

      196608:yOFqan6gqBkCWWLXKNMpeRjO35+DsCWbkCqlNYYed5Wly6Rarz3:yOFf6hkXiXKNo3AsCWbkC2YYIW5arz3

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks