General

  • Target

    ToonDriveapk.apk

  • Size

    15.9MB

  • Sample

    230704-sx1d4aeh77

  • MD5

    da3628b2a375448ed4b7410bf1b0c74e

  • SHA1

    e33e4bb6558b0e256630ee8c1d4c6aca14333e4a

  • SHA256

    888878403a44e4fd9835bccd327835f845851b3c54c2aa2d6b72744a472f6edc

  • SHA512

    6a3a2e1ef09df463e0b2f53947f1fa2443f06647f40fe9dd02069b9da5275538cdbab12d27ebe856e852b4efd98bab9dbec862ec3300ed76a5f3cf9d477b8ab5

  • SSDEEP

    393216:AHgC9ZMHVT/2CAHob38aF9d1osDISKP32NQQU:ygCzMHECAILnF1V/KPMbU

Malware Config

Targets

    • Target

      ToonDriveapk.apk

    • Size

      15.9MB

    • MD5

      da3628b2a375448ed4b7410bf1b0c74e

    • SHA1

      e33e4bb6558b0e256630ee8c1d4c6aca14333e4a

    • SHA256

      888878403a44e4fd9835bccd327835f845851b3c54c2aa2d6b72744a472f6edc

    • SHA512

      6a3a2e1ef09df463e0b2f53947f1fa2443f06647f40fe9dd02069b9da5275538cdbab12d27ebe856e852b4efd98bab9dbec862ec3300ed76a5f3cf9d477b8ab5

    • SSDEEP

      393216:AHgC9ZMHVT/2CAHob38aF9d1osDISKP32NQQU:ygCzMHECAILnF1V/KPMbU

    Score
    9/10
    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

    • Target

      crear_transaction.html

    • Size

      3KB

    • MD5

      d6ff756b957c9d1e55de124e692099d0

    • SHA1

      9e1701210b37688ad5c76a656aecc8b12fec5f82

    • SHA256

      5ccdf32d36d4b5596d51c7d3776221f7768733c390b8cbb62a462e5ac6bf1d8b

    • SHA512

      253db3579712b5465cae7554ff332ab41ae0577711c89a21fe68d0a066d410b15162045573bb31f03fbcb7a17ae530a769846d16a4d8e1503d42b8328f891795

    Score
    1/10

MITRE ATT&CK Enterprise v6

Tasks