General

  • Target

    Minecraft-1.20.51.01-apktodo.io.apk

  • Size

    725.7MB

  • Sample

    240113-eqv9xacdh5

  • MD5

    73e0c043eeba9777a3af898f6606f2da

  • SHA1

    5687821dcffd2a828fd77dfafd319438274c7ac8

  • SHA256

    c7b69696a98aa886b9a8b977f9dbe0ce1bfcd86467bace730ea41f20928d3aea

  • SHA512

    0f5b715248746437670ca8339cbf152977ec1ddd6e12e07d7bfb7bb9a98c1001c28c2f7eca90fd112ee3616aa28a123ff174cb4c8679e1f104f3ac8eb2b089c1

  • SSDEEP

    12582912:cxfClk+gmDtCabb//GyY3xJ4IdpdDydBZ8rI9zeQ/50ErDsYX17t6:cwlk+gmRCabb2yM4IdPD6BZ4Cl/50Er2

Score
7/10

Malware Config

Targets

    • Target

      Minecraft-1.20.51.01-apktodo.io.apk

    • Size

      725.7MB

    • MD5

      73e0c043eeba9777a3af898f6606f2da

    • SHA1

      5687821dcffd2a828fd77dfafd319438274c7ac8

    • SHA256

      c7b69696a98aa886b9a8b977f9dbe0ce1bfcd86467bace730ea41f20928d3aea

    • SHA512

      0f5b715248746437670ca8339cbf152977ec1ddd6e12e07d7bfb7bb9a98c1001c28c2f7eca90fd112ee3616aa28a123ff174cb4c8679e1f104f3ac8eb2b089c1

    • SSDEEP

      12582912:cxfClk+gmDtCabb//GyY3xJ4IdpdDydBZ8rI9zeQ/50ErDsYX17t6:cwlk+gmRCabb2yM4IdPD6BZ4Cl/50Er2

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks