General

  • Target

    5c454161f4bab8c2603036b12c580ba6

  • Size

    180KB

  • Sample

    231222-d51bqsdaf4

  • MD5

    5c454161f4bab8c2603036b12c580ba6

  • SHA1

    cdded1f219a45c4173fdcce7cf54e4597daf0dce

  • SHA256

    4821febf1c36bff03c906aa27e49154e98e3fa4f7e63eeff8acbc3ef87405692

  • SHA512

    0b818c3c3b700149451b31e6bdc25a35fdd8ef0d08d2c2f40152401122d19946a61343bc7d4692c132b3aad72e2e31eaf8279f630e069d1d59de398de7f890e4

  • SSDEEP

    3072:7Scxv7Bg9UvWxKJG+D4LVRJ1PFYlOYVQbtUW6dWXQch9vODwPRrO:9v7G9UaGcBRHPFlYVQBUgQImEO

Score
8/10

Malware Config

Targets

    • Target

      GingerBreak.apk

    • Size

      294KB

    • MD5

      07e1be43eed15b7c764d0bbece61c9cf

    • SHA1

      b10a18e8294891b58a3b1f6fec6e1be0ff444003

    • SHA256

      c135244de7b8d3c9c6186c572e4a68dc792abc55f029791d76e08838695e6162

    • SHA512

      da2bb4df8d96377b4982f4ac91942b7d903626fa6510684bc26574ee77487382e54cffd0296d816937e1f73b249bf1681b2aa88891b57f9a56ccde414fd870c8

    • SSDEEP

      6144:9qnM3/cdCc8EniGdFsXoIxrdQ502JUpNTOsxgBpcmV:TEdvCceokrdQ50jLXWzV

    Score
    1/10
    • Target

      superuser.png

    • Size

      191KB

    • MD5

      4ec9e96986478cb000f9d58f374f39f5

    • SHA1

      7479e11f4df198c743bd430ef54f94999690c73b

    • SHA256

      df3c4cbe2b41398bf8e1e807f5ca1b8a6ca2ebe3f1686f95bc36ea83bbea694e

    • SHA512

      66014107235633919b12ec22437d95651b9f00ea6a0eee5e90ee957b6a4e12b05cecd6a217d4b92e206d8e38442a9e10a754c4275a50fcf19c984b41edaf32f9

    • SSDEEP

      3072:ysF8CMXMGIIFzrdQ5023X9phSTt6rUKaJ/O4OroXB2Nda6B5Hpb2/:dFsXoIxrdQ502JUpNTOsxgBpc/

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Matrix

Tasks