General

  • Target

    MT2.15.4.apk

  • Size

    23.1MB

  • Sample

    240518-fgtkdscf2s

  • MD5

    af3dd8ed03fbd4e204657cef19f8f5e0

  • SHA1

    c5e7a4919e3fd591d45823dd0718cf0e3b478d06

  • SHA256

    fa5381e2413bcebcee55fe6c751479d6793e000b6a5f2ce9c8c08dc776459166

  • SHA512

    66b49876902d13b386eed5464beb2efa627f87d9aaebdc5af208291a5054c9301dc8ed8036899b89ba8c423610ed3f65c10dc52e6652d5b0b644a2298f2a938e

  • SSDEEP

    393216:Qb3wOLuDmYPCTO1njR/u0fbLtEblgdBfsuaAC612LLLOH2h6sn7+BN+10tBdeZ18:Qb3eSYP11ZLPUqdBf/aAj92EIyw00Zva

Malware Config

Targets

    • Target

      MT2.15.4.apk

    • Size

      23.1MB

    • MD5

      af3dd8ed03fbd4e204657cef19f8f5e0

    • SHA1

      c5e7a4919e3fd591d45823dd0718cf0e3b478d06

    • SHA256

      fa5381e2413bcebcee55fe6c751479d6793e000b6a5f2ce9c8c08dc776459166

    • SHA512

      66b49876902d13b386eed5464beb2efa627f87d9aaebdc5af208291a5054c9301dc8ed8036899b89ba8c423610ed3f65c10dc52e6652d5b0b644a2298f2a938e

    • SSDEEP

      393216:Qb3wOLuDmYPCTO1njR/u0fbLtEblgdBfsuaAC612LLLOH2h6sn7+BN+10tBdeZ18:Qb3eSYP11ZLPUqdBf/aAj92EIyw00Zva

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks if the internet connection is available

    • Target

      filetransfer.apk

    • Size

      18KB

    • MD5

      fed901fecf7df630a4f77432aa6d09c4

    • SHA1

      e36169eb5414092ce5d25c194fadf85eca6c29cc

    • SHA256

      96055a6e6694d6c6578b4dff108b83275758096af4a193c2701de354a26c7603

    • SHA512

      7a8612b767e1c6d6d7c0b2d3d7671ca18e33df385be725e53ee64cf7c3bac04d2e8425c75d4dbba7adae713789b3fd214acbd30bec91388865c86fef9baf2b39

    • SSDEEP

      384:JXhjYqi39Lw1w+AVX1Ctjo5d7BsqehoY5R3v6wAoAqykWrc:BhkF3Bw1xnU5d7GoyR3v653kz

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks