General

  • Target

    Super Star_1.0_Apkpure.apk

  • Size

    4.8MB

  • Sample

    230723-wle6kagb21

  • MD5

    f12428cbc5331fcf0268c564fbf158a5

  • SHA1

    096c714b159dada0319b810e378c4a4d083e2536

  • SHA256

    e6690199e68397a307961f8519d26da4ab7a591695244d8099bb0b44a1eea81c

  • SHA512

    ca3c5a4396d93df96d446e531ee74dfa25aff25d88db69f7ec3a4951a2771bdeedc71ac405655edeb5fd6c0bad1ab432b23480ad6eb265a9c22da5b60333123c

  • SSDEEP

    98304:L8GRN8x7ZdU3Xvy+ebLaAGmzy2Q9PLH9R8Rtx4BgLCr44jGW:bc1dm6rbLaAG0a9pcx4tjGW

Score
7/10

Malware Config

Targets

    • Target

      Super Star_1.0_Apkpure.apk

    • Size

      4.8MB

    • MD5

      f12428cbc5331fcf0268c564fbf158a5

    • SHA1

      096c714b159dada0319b810e378c4a4d083e2536

    • SHA256

      e6690199e68397a307961f8519d26da4ab7a591695244d8099bb0b44a1eea81c

    • SHA512

      ca3c5a4396d93df96d446e531ee74dfa25aff25d88db69f7ec3a4951a2771bdeedc71ac405655edeb5fd6c0bad1ab432b23480ad6eb265a9c22da5b60333123c

    • SSDEEP

      98304:L8GRN8x7ZdU3Xvy+ebLaAGmzy2Q9PLH9R8Rtx4BgLCr44jGW:bc1dm6rbLaAG0a9pcx4tjGW

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks