General

  • Target

    01ead8895c4b9f1e8d255a497d478b05.apk

  • Size

    6.4MB

  • Sample

    230530-hm885sfh59

  • MD5

    01ead8895c4b9f1e8d255a497d478b05

  • SHA1

    bed7c837498b4ef65da42658fdd9ea7a9f9f2b93

  • SHA256

    ff67d2b4ddbc15cda3373b68289416f8f1c3a424925272ed2b153af61a1c9f94

  • SHA512

    a467d86ca3e5f6134aa18509bfb5b749804080ed1cfe2a9da6a16254709bddf6f8fe73f00e123ee5069b379e536549c958917c9dd28a1f4826c1f1040f318e9a

  • SSDEEP

    196608:710sf0K6Nt9FmO/wlHyJy7OY0aBB6SKobh/:pkpFUypY0aL

Score
9/10

Malware Config

Targets

    • Target

      01ead8895c4b9f1e8d255a497d478b05.apk

    • Size

      6.4MB

    • MD5

      01ead8895c4b9f1e8d255a497d478b05

    • SHA1

      bed7c837498b4ef65da42658fdd9ea7a9f9f2b93

    • SHA256

      ff67d2b4ddbc15cda3373b68289416f8f1c3a424925272ed2b153af61a1c9f94

    • SHA512

      a467d86ca3e5f6134aa18509bfb5b749804080ed1cfe2a9da6a16254709bddf6f8fe73f00e123ee5069b379e536549c958917c9dd28a1f4826c1f1040f318e9a

    • SSDEEP

      196608:710sf0K6Nt9FmO/wlHyJy7OY0aBB6SKobh/:pkpFUypY0aL

    Score
    9/10
    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks