General

  • Target

    PowerDirector_v12.6.0_b1222130__Premium_.apk

  • Size

    184.7MB

  • Sample

    231024-h8xr8sbd4x

  • MD5

    13df1e979c39180616a8fabccd802729

  • SHA1

    ad49fd7c71a69504d79f488665cc75850edadf43

  • SHA256

    699a28e90f4bcea6b6272c6d2016ac77bfac250970104ce33a60db3b39b6522e

  • SHA512

    4d1ecf7112ccb628537e639d192aceb11c812a48927cfdb9c3a6da31bdb893f9a572136acf62d8148ab96b1919ce3c1fa298607dcb09b5b15a069fa0643d4a5a

  • SSDEEP

    3145728:Xk5PVxr07R5XU5vAy0MEhmNfqZf/f74fGtmiEl6VWyIeddhodRf+vzjl+8rKrAJK:05bORuvjtEMNfqZf/f74fGtFjjdhARGY

Score
7/10

Malware Config

Targets

    • Target

      PowerDirector_v12.6.0_b1222130__Premium_.apk

    • Size

      184.7MB

    • MD5

      13df1e979c39180616a8fabccd802729

    • SHA1

      ad49fd7c71a69504d79f488665cc75850edadf43

    • SHA256

      699a28e90f4bcea6b6272c6d2016ac77bfac250970104ce33a60db3b39b6522e

    • SHA512

      4d1ecf7112ccb628537e639d192aceb11c812a48927cfdb9c3a6da31bdb893f9a572136acf62d8148ab96b1919ce3c1fa298607dcb09b5b15a069fa0643d4a5a

    • SSDEEP

      3145728:Xk5PVxr07R5XU5vAy0MEhmNfqZf/f74fGtmiEl6VWyIeddhodRf+vzjl+8rKrAJK:05bORuvjtEMNfqZf/f74fGtFjjdhARGY

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks