General

  • Target

    (@ApkClub)Anime_V4.0.4.apk

  • Size

    10.2MB

  • Sample

    231104-twcr3sef33

  • MD5

    9a4a9a29f01c88e15082d6609ccec88f

  • SHA1

    00daf8724b057e6ff89283f7513af85d34cacbf1

  • SHA256

    be07a23193d78030cce80b98adecb95cdb1d4cfad61a4708296432cd9feafa0b

  • SHA512

    ef51b7ef482954b1ccfbfc69ceb8e26b8343f37ff1d06c744666880d64a4d2d7801bc3ef33925e824474ea7f1b8c5f7c9ec5cc9b46e8f736c0d797f219e7162d

  • SSDEEP

    196608:YKxBiPx0ifxvh8brFCndd71Pp0g6x3icwg5TYZTyV+T1lxJDW29g:9i+ifxWSdZ1PW3xSzcTV+xlfL9g

Score
7/10

Malware Config

Targets

    • Target

      (@ApkClub)Anime_V4.0.4.apk

    • Size

      10.2MB

    • MD5

      9a4a9a29f01c88e15082d6609ccec88f

    • SHA1

      00daf8724b057e6ff89283f7513af85d34cacbf1

    • SHA256

      be07a23193d78030cce80b98adecb95cdb1d4cfad61a4708296432cd9feafa0b

    • SHA512

      ef51b7ef482954b1ccfbfc69ceb8e26b8343f37ff1d06c744666880d64a4d2d7801bc3ef33925e824474ea7f1b8c5f7c9ec5cc9b46e8f736c0d797f219e7162d

    • SSDEEP

      196608:YKxBiPx0ifxvh8brFCndd71Pp0g6x3icwg5TYZTyV+T1lxJDW29g:9i+ifxWSdZ1PW3xSzcTV+xlfL9g

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks