General

  • Target

    4kvideodownloader_1.11.1.apk

  • Size

    44.7MB

  • Sample

    231107-199gjahe4z

  • MD5

    473dbe699f4ea86199b36be73ac9dc31

  • SHA1

    ac69ee8d8a55ed67666ef5e59bdcc08b12be1e01

  • SHA256

    63a432f4e261a2f7941303ed76732d5b901bd1ddb89db0b608200904b9bae45d

  • SHA512

    1d196cc29aed2d18371cfc3f5cd1efd96ca93c6c7d93a513ac605150b68376a31502ad652da9fc0866c60c47827361ed79297c0cd92837576bf87c2354242fd9

  • SSDEEP

    786432:LH4csa7DUQwZp0dozZar04NQbJV72Cs7LpUqE3ZGc+0smC7fe1W/oURnqHjxN1+v:LYXa7DULb0QM44NaV7rs5LEJumC7f4fU

Score
7/10

Malware Config

Targets

    • Target

      4kvideodownloader_1.11.1.apk

    • Size

      44.7MB

    • MD5

      473dbe699f4ea86199b36be73ac9dc31

    • SHA1

      ac69ee8d8a55ed67666ef5e59bdcc08b12be1e01

    • SHA256

      63a432f4e261a2f7941303ed76732d5b901bd1ddb89db0b608200904b9bae45d

    • SHA512

      1d196cc29aed2d18371cfc3f5cd1efd96ca93c6c7d93a513ac605150b68376a31502ad652da9fc0866c60c47827361ed79297c0cd92837576bf87c2354242fd9

    • SSDEEP

      786432:LH4csa7DUQwZp0dozZar04NQbJV72Cs7LpUqE3ZGc+0smC7fe1W/oURnqHjxN1+v:LYXa7DULb0QM44NaV7rs5LEJumC7f4fU

    Score
    6/10
    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      android_rcc_bundle.rcc

    • Size

      1.7MB

    • MD5

      1d4e17b27824cbb660ca044afd2ec816

    • SHA1

      2e938df55aa3d572b1d1a672cce7b22bf92bb603

    • SHA256

      e0b7d7ee61d0a433bd1712ff1caa995ce5a2fe4afb5768d552be03070721d573

    • SHA512

      791154a8daa01f67162fa5ecf46cd5b0a279bcf480363c43f1717e6177d393c7f884fb10cc72d05b80a77c568b22a582850e71be79eafc5ef48c70aa15bae475

    • SSDEEP

      12288:ssFsbsesusYs7sxsasZsPscsUszs/s+s7sesfs5sHsCsSsPsRsrs/s7sbscsgs5I:pDtc0FcQoYcEbwISW05yi/QbTEr9hV

    Score
    1/10

MITRE ATT&CK Matrix

Tasks