General

  • Target

    Vimeo_base.apk

  • Size

    24.7MB

  • Sample

    231012-c28chacg49

  • MD5

    362fc29121a966783dab632bfc166904

  • SHA1

    7357256367a9997daf21101d4333a9b462efe3c8

  • SHA256

    548968b4d538169e0ae7e54c2b1857a77518366d4aa1a0468c1f8d769fdc8256

  • SHA512

    660fce1d38a0bf99a203f48a6438a21a79f95b67419bf057aece032e41b8d9dd8c47afefa65f178c5d210faae6bc12254548a6c845a8f2f946eb23ff3940f0ba

  • SSDEEP

    786432:0ik+d4XWIHaBEDEbirUBTs2TBDXgfHjx6:J+F6BAEbIynTBTgfHw

Score
7/10

Malware Config

Targets

    • Target

      Vimeo_base.apk

    • Size

      24.7MB

    • MD5

      362fc29121a966783dab632bfc166904

    • SHA1

      7357256367a9997daf21101d4333a9b462efe3c8

    • SHA256

      548968b4d538169e0ae7e54c2b1857a77518366d4aa1a0468c1f8d769fdc8256

    • SHA512

      660fce1d38a0bf99a203f48a6438a21a79f95b67419bf057aece032e41b8d9dd8c47afefa65f178c5d210faae6bc12254548a6c845a8f2f946eb23ff3940f0ba

    • SSDEEP

      786432:0ik+d4XWIHaBEDEbirUBTs2TBDXgfHjx6:J+F6BAEbIynTBTgfHw

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks