General

  • Target

    Hipercard_base.apk

  • Size

    76.6MB

  • Sample

    230520-da7sbscg6w

  • MD5

    c36d4565aa19c57994d5d73d38687694

  • SHA1

    cd21510fe307f953d02c0a18f34c2ec551c569ed

  • SHA256

    fccc4e17abb4ab415648310c1534f1c0d9a363bc0f8de8f590f7a76a61078e69

  • SHA512

    9e002a5939907d721bbaf048b26f16422d5a337efdf077064c0c5f71dd68e1de72fed05758cf7ac1bf8e3936cc2a715fdc46f09ef23f1b697214507217f3f9f8

  • SSDEEP

    1572864:4mCMMyeTcH0mLqev1DzNwr8KBz5WZ4WZtCHwxfzi:dCZH4UheZqoKXG/Z0Hw1O

Score
7/10

Malware Config

Targets

    • Target

      Hipercard_base.apk

    • Size

      76.6MB

    • MD5

      c36d4565aa19c57994d5d73d38687694

    • SHA1

      cd21510fe307f953d02c0a18f34c2ec551c569ed

    • SHA256

      fccc4e17abb4ab415648310c1534f1c0d9a363bc0f8de8f590f7a76a61078e69

    • SHA512

      9e002a5939907d721bbaf048b26f16422d5a337efdf077064c0c5f71dd68e1de72fed05758cf7ac1bf8e3936cc2a715fdc46f09ef23f1b697214507217f3f9f8

    • SSDEEP

      1572864:4mCMMyeTcH0mLqev1DzNwr8KBz5WZ4WZtCHwxfzi:dCZH4UheZqoKXG/Z0Hw1O

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks