General

  • Target

    Delta Executor new.apk

  • Size

    131.6MB

  • Sample

    231001-f9yptahc3s

  • MD5

    d9dbeaae2429dfc7d5fa1f2181c2d6b9

  • SHA1

    8c8446e0e908dffd6d764c6dec1ead57979f2d23

  • SHA256

    1e969eaa13d2d76f5be074a5a00eb7a3c1114493055db88de7074c52a7e97c06

  • SHA512

    fa9f1739b21e025239257dac9b75c20eb87ba46c5a18b9a3776adc847f05867eb6b510377857d37f5e3ee66ab59f9de183bbc0e220055fe1ea03b502ab733e52

  • SSDEEP

    3145728:+vlLbKcQjVzNyK9InobmN+d8R6lqhnIwty3EMlSAGIK0W:eMJNkKGnoTK6chnI13EySmK3

Malware Config

Targets

    • Target

      Delta Executor new.apk

    • Size

      131.6MB

    • MD5

      d9dbeaae2429dfc7d5fa1f2181c2d6b9

    • SHA1

      8c8446e0e908dffd6d764c6dec1ead57979f2d23

    • SHA256

      1e969eaa13d2d76f5be074a5a00eb7a3c1114493055db88de7074c52a7e97c06

    • SHA512

      fa9f1739b21e025239257dac9b75c20eb87ba46c5a18b9a3776adc847f05867eb6b510377857d37f5e3ee66ab59f9de183bbc0e220055fe1ea03b502ab733e52

    • SSDEEP

      3145728:+vlLbKcQjVzNyK9InobmN+d8R6lqhnIwty3EMlSAGIK0W:eMJNkKGnoTK6chnI13EySmK3

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v15

Tasks