General

  • Target

    034e7a00d9cb47e9f43363d7977cbfa7.apk

  • Size

    6.3MB

  • Sample

    230530-hvwm1sga23

  • MD5

    034e7a00d9cb47e9f43363d7977cbfa7

  • SHA1

    9b4cee824f9bac058d6ffe75f0f1240a487f8961

  • SHA256

    bfbf60df6f0bb98938f5a0a4f04cd55864d526ebfc634abe0ae747889583c92d

  • SHA512

    89c3b88206ee699e42d8811399cc40e7ba9812d2e29c7b40c71cdb132730aaf75fd938513d3edfd2acb3f04e37baadb1cbfdb64f4e14a3deec34f37c8405fce2

  • SSDEEP

    196608:g50ct0wEXrt9FmO/wlHyJy7OY0aBB6SKobhY:86X7FUypY0a0

Score
9/10

Malware Config

Targets

    • Target

      034e7a00d9cb47e9f43363d7977cbfa7.apk

    • Size

      6.3MB

    • MD5

      034e7a00d9cb47e9f43363d7977cbfa7

    • SHA1

      9b4cee824f9bac058d6ffe75f0f1240a487f8961

    • SHA256

      bfbf60df6f0bb98938f5a0a4f04cd55864d526ebfc634abe0ae747889583c92d

    • SHA512

      89c3b88206ee699e42d8811399cc40e7ba9812d2e29c7b40c71cdb132730aaf75fd938513d3edfd2acb3f04e37baadb1cbfdb64f4e14a3deec34f37c8405fce2

    • SSDEEP

      196608:g50ct0wEXrt9FmO/wlHyJy7OY0aBB6SKobhY:86X7FUypY0a0

    Score
    9/10
    • Renames multiple (56) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks