General

  • Target

    0d09d5e46e779d796a8d295043e5bbd90ac43705fa7ff7953faa5d8370840f93

  • Size

    4.3MB

  • Sample

    240410-lh1mzsdh2t

  • MD5

    6151b1e2e5035a8eb596ce1c37565e87

  • SHA1

    bf482e86d512da46126f0e61733bca4352620176

  • SHA256

    0d09d5e46e779d796a8d295043e5bbd90ac43705fa7ff7953faa5d8370840f93

  • SHA512

    16c6c311287fc4f19e701cfc964b17b1d754d8aee7b8d745652bfc1f02aaf5638487e63aff5a900b7cb629ddfc62f896856626440da74b17662f80ca4b2f1e22

  • SSDEEP

    98304:AGtCFIYkriTxD7j9bapQAnLUDaZKSRVrYO/eh1cLsdFrufrcjEj3:FWpD37dSRVWh1cLsdML

Malware Config

Extracted

Family

furball

C2

http://www.androidsystemswebview.com/msd

Targets

    • Target

      0d09d5e46e779d796a8d295043e5bbd90ac43705fa7ff7953faa5d8370840f93

    • Size

      4.3MB

    • MD5

      6151b1e2e5035a8eb596ce1c37565e87

    • SHA1

      bf482e86d512da46126f0e61733bca4352620176

    • SHA256

      0d09d5e46e779d796a8d295043e5bbd90ac43705fa7ff7953faa5d8370840f93

    • SHA512

      16c6c311287fc4f19e701cfc964b17b1d754d8aee7b8d745652bfc1f02aaf5638487e63aff5a900b7cb629ddfc62f896856626440da74b17662f80ca4b2f1e22

    • SSDEEP

      98304:AGtCFIYkriTxD7j9bapQAnLUDaZKSRVrYO/eh1cLsdFrufrcjEj3:FWpD37dSRVWh1cLsdML

    Score
    7/10
    • Queries account information for other applications stored on the device.

      Application may abuse the framework's APIs to collect account information stored on the device.

MITRE ATT&CK Mobile v15

Tasks