General

  • Target

    Crayon_v4.6_P.apk

  • Size

    52.9MB

  • Sample

    240114-dq27sacba3

  • MD5

    5e0c9278e38ab31cfc2ef52d07e67cbc

  • SHA1

    5478c85df1a0452520ed8027b3bc946ef7938526

  • SHA256

    a236c362439c180369f4f9b156630d0702cb6d72945cd4efcd2517a35f115d6b

  • SHA512

    9d001ae1c318f311d98aeef6b7b16964066fd2c365cc7582b2e6480bd4586ce29389ef7d72adaf62574e17e21fd1490c0cf8cd6cdbe62c434283ff2fd934986c

  • SSDEEP

    1572864:HhycG0byNFIPqP0L/f802Qid/3g7iLkloU1xM:bly0qcL/EPd/3yiLkloUzM

Score
7/10

Malware Config

Targets

    • Target

      Crayon_v4.6_P.apk

    • Size

      52.9MB

    • MD5

      5e0c9278e38ab31cfc2ef52d07e67cbc

    • SHA1

      5478c85df1a0452520ed8027b3bc946ef7938526

    • SHA256

      a236c362439c180369f4f9b156630d0702cb6d72945cd4efcd2517a35f115d6b

    • SHA512

      9d001ae1c318f311d98aeef6b7b16964066fd2c365cc7582b2e6480bd4586ce29389ef7d72adaf62574e17e21fd1490c0cf8cd6cdbe62c434283ff2fd934986c

    • SSDEEP

      1572864:HhycG0byNFIPqP0L/f802Qid/3g7iLkloU1xM:bly0qcL/EPd/3yiLkloUzM

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

Tasks