General

  • Target

    PvZ2 Reflourished (60 fps).apk

  • Size

    37.0MB

  • Sample

    230715-sef8hacb8t

  • MD5

    126ccb96f5f5069b49c53733b67817b3

  • SHA1

    45568ebe0949717464ee1b658b9abb0bb48937b1

  • SHA256

    4aa093e27d07b9f273b4505c7fe3a495b23275cf219b0eaaf4db45aa35ecc41a

  • SHA512

    37eb939a9f72e5ff4428fe3f96694d4655aa1fa084fcb6e5aaf67c9223c38dde933feacef08992caa72cbc173abfae0686537b254788d561af415099536acb8f

  • SSDEEP

    786432:9AmVzzsDx7xKCGOqYkh2ih17l6PXKcEwDzgqvMEuDqSO9a4rP:9AWzsDxYDO1Pih1sv4wX5kq9ZrP

Score
7/10

Malware Config

Targets

    • Target

      PvZ2 Reflourished (60 fps).apk

    • Size

      37.0MB

    • MD5

      126ccb96f5f5069b49c53733b67817b3

    • SHA1

      45568ebe0949717464ee1b658b9abb0bb48937b1

    • SHA256

      4aa093e27d07b9f273b4505c7fe3a495b23275cf219b0eaaf4db45aa35ecc41a

    • SHA512

      37eb939a9f72e5ff4428fe3f96694d4655aa1fa084fcb6e5aaf67c9223c38dde933feacef08992caa72cbc173abfae0686537b254788d561af415099536acb8f

    • SSDEEP

      786432:9AmVzzsDx7xKCGOqYkh2ih17l6PXKcEwDzgqvMEuDqSO9a4rP:9AWzsDxYDO1Pih1sv4wX5kq9ZrP

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks