General

  • Target

    f0496840c3627e5b839251f1de000828-1.apk

  • Size

    443KB

  • Sample

    230922-l1es8shc99

  • MD5

    92a57e55d0e04511a9bd3b819a3702b2

  • SHA1

    715b298fd869672021fb17d2a358fcf122c0268e

  • SHA256

    31f8620a467279cbfa516e368cd96a72ffb8cc0aebb299acea9221035e0cf60e

  • SHA512

    ad5e793b873d97dd2421f515a4d23c40d0455d86e9da5cda41db3de3d70d268134db0178eefc0b4d89b168d7e38797d4e97643e1e0179fc35ba58f5eb165902a

  • SSDEEP

    12288:hKuI17NtsD5BxmwMXWFXoY+pdcRZtSwfW6FKlhY6Zze:8ZZODhmwMm7W2jtScPFKlucK

Malware Config

Targets

    • Target

      f0496840c3627e5b839251f1de000828-1.apk

    • Size

      443KB

    • MD5

      92a57e55d0e04511a9bd3b819a3702b2

    • SHA1

      715b298fd869672021fb17d2a358fcf122c0268e

    • SHA256

      31f8620a467279cbfa516e368cd96a72ffb8cc0aebb299acea9221035e0cf60e

    • SHA512

      ad5e793b873d97dd2421f515a4d23c40d0455d86e9da5cda41db3de3d70d268134db0178eefc0b4d89b168d7e38797d4e97643e1e0179fc35ba58f5eb165902a

    • SSDEEP

      12288:hKuI17NtsD5BxmwMXWFXoY+pdcRZtSwfW6FKlhY6Zze:8ZZODhmwMm7W2jtScPFKlucK

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

    • Target

      xhelperdata.jar

    • Size

      211KB

    • MD5

      26d1f7625f74fd78f4487f6d89ea08c9

    • SHA1

      a5cf0ebcbb0d9aed587487460b1a13b685b4a820

    • SHA256

      8a256c4aeac80393d8446a7b426d838f4d76e290d31fa9eb0b5c17b75f935828

    • SHA512

      45cbf1cb599ad431e73ae10312dae88641d1e98e3c2363c154ce8aec9a2ba45e93e8196c06e680933cf1ed869cd2df66b0f77be84ceee5781b96aeb8f98affc1

    • SSDEEP

      6144:7K3ejE17NtsDhr/JocECgcrIpouxTvHWFeqS:7KuI17NtsD5BxmwMXWFQ

    Score
    1/10

MITRE ATT&CK Matrix

Tasks