General

  • Target

    revenue.apk

  • Size

    12.1MB

  • Sample

    230904-e7d2ysdf7w

  • MD5

    f7ec02659a0ff1e0815a1a2519bdd75f

  • SHA1

    8e1fb73223a297712cf436fa7ca8550d1fa5e742

  • SHA256

    8217c25ba07efce758f178000f257e1ef950d2331544cc0bbcc08cad6839292c

  • SHA512

    a29f929b8490c38dc9ceff501b615bd08457767273598be2e4c36ec465d8279ef35500bbe57172bac2895cd17df9f1311a18c715b9daa8528bae8fc1d48b76a9

  • SSDEEP

    196608:JFTh2IahZp8DVlI6zy/I3s3+xuW8jNqTJYW20aykLXKXelp:LTnvZllzy1W8dWqLXYYp

Score
10/10

Malware Config

Extracted

Family

gigabud

C2

http://addc5.cc/x/command?token=

http://8.219.85.91:8888/push-streaming?id=1234

Targets

    • Target

      revenue.apk

    • Size

      12.1MB

    • MD5

      f7ec02659a0ff1e0815a1a2519bdd75f

    • SHA1

      8e1fb73223a297712cf436fa7ca8550d1fa5e742

    • SHA256

      8217c25ba07efce758f178000f257e1ef950d2331544cc0bbcc08cad6839292c

    • SHA512

      a29f929b8490c38dc9ceff501b615bd08457767273598be2e4c36ec465d8279ef35500bbe57172bac2895cd17df9f1311a18c715b9daa8528bae8fc1d48b76a9

    • SSDEEP

      196608:JFTh2IahZp8DVlI6zy/I3s3+xuW8jNqTJYW20aykLXKXelp:LTnvZllzy1W8dWqLXYYp

    Score
    1/10

MITRE ATT&CK Matrix

Tasks