General

  • Target

    base.apk

  • Size

    7.2MB

  • Sample

    240425-j1593sha33

  • MD5

    c1b521c8dc801e2bf5a55acbaef8b7a9

  • SHA1

    c6c6809a22c846a632660902a7340da7c0f2a3c9

  • SHA256

    02697b8ed995ceab86c6b24795270f4fdc6bad60d9153fcb48d3019f600d6cb8

  • SHA512

    6606df2ea3d05c69d4ea87fe42c0aa79ea29aa89425a890298bdaddbc92365824aef997fa965147a1f2379bd5c22485f3bc023ff33082118c99557b573df8b1e

  • SSDEEP

    196608:NgSXKrTMNyUmRUJJphvBOMCe68lvAJgTttJz:NjXQMEMJJ24lzt

Malware Config

Targets

    • Target

      base.apk

    • Size

      7.2MB

    • MD5

      c1b521c8dc801e2bf5a55acbaef8b7a9

    • SHA1

      c6c6809a22c846a632660902a7340da7c0f2a3c9

    • SHA256

      02697b8ed995ceab86c6b24795270f4fdc6bad60d9153fcb48d3019f600d6cb8

    • SHA512

      6606df2ea3d05c69d4ea87fe42c0aa79ea29aa89425a890298bdaddbc92365824aef997fa965147a1f2379bd5c22485f3bc023ff33082118c99557b573df8b1e

    • SSDEEP

      196608:NgSXKrTMNyUmRUJJphvBOMCe68lvAJgTttJz:NjXQMEMJJ24lzt

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks