General

  • Target

    inat-box-v12.apk

  • Size

    10.6MB

  • Sample

    231112-fh2x6ade79

  • MD5

    0ecc3329ff4ad6683e76a663554189b7

  • SHA1

    67e29632ce37ba92de2b8d100848073a121d9a04

  • SHA256

    b8c5eef8b9473eb42b5d05a0bf36b903d99f355e42d76c235d330fab41fed568

  • SHA512

    d65aa9f46ec1523fb4fec4be3c80c4d03d1d8c25267fe8e0373a32793fbc0e3bd7e376e76fe64adfae1aef17b9871592f83b499a2d7b5c3f588014d587cb649a

  • SSDEEP

    196608:iMZSshiKCwaHvVl32VvKMxYUb1LhPqAkOLdgFsMtcwrwdC:iivDGUbNhP9kOLdcjtIC

Score
7/10

Malware Config

Targets

    • Target

      inat-box-v12.apk

    • Size

      10.6MB

    • MD5

      0ecc3329ff4ad6683e76a663554189b7

    • SHA1

      67e29632ce37ba92de2b8d100848073a121d9a04

    • SHA256

      b8c5eef8b9473eb42b5d05a0bf36b903d99f355e42d76c235d330fab41fed568

    • SHA512

      d65aa9f46ec1523fb4fec4be3c80c4d03d1d8c25267fe8e0373a32793fbc0e3bd7e376e76fe64adfae1aef17b9871592f83b499a2d7b5c3f588014d587cb649a

    • SSDEEP

      196608:iMZSshiKCwaHvVl32VvKMxYUb1LhPqAkOLdgFsMtcwrwdC:iivDGUbNhP9kOLdcjtIC

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Enterprise v15

Tasks