General

  • Target

    waterfly-iii.apk

  • Size

    10.4MB

  • Sample

    240522-n8ffvagd4x

  • MD5

    906ebf16833ae1842eb03054e0bcc4b7

  • SHA1

    b664030e47839afbc2a072e1900e2d34ad9a254c

  • SHA256

    a80522dad5f1afe0f0dde3e954333f7a57746e134cc03bc9622f7d4cf7c73c2c

  • SHA512

    a59c01ff8627954021fe7e6cedc9bdb45fb47b781cf038572e8c5158fc6031f0bb27bbada48f011581e59bebdffd1b604d24ee97f4ab9d80167b4f4b6fd79881

  • SSDEEP

    196608:6O8IVBNRcCI2LdxVFeQxYgkFWTOHaYjnHSydflXeCbiP9VHqrRqbqzs:6OLpR8Kx2QqgwWTO6+nHSk9O1aR9s

Malware Config

Targets

    • Target

      waterfly-iii.apk

    • Size

      10.4MB

    • MD5

      906ebf16833ae1842eb03054e0bcc4b7

    • SHA1

      b664030e47839afbc2a072e1900e2d34ad9a254c

    • SHA256

      a80522dad5f1afe0f0dde3e954333f7a57746e134cc03bc9622f7d4cf7c73c2c

    • SHA512

      a59c01ff8627954021fe7e6cedc9bdb45fb47b781cf038572e8c5158fc6031f0bb27bbada48f011581e59bebdffd1b604d24ee97f4ab9d80167b4f4b6fd79881

    • SSDEEP

      196608:6O8IVBNRcCI2LdxVFeQxYgkFWTOHaYjnHSydflXeCbiP9VHqrRqbqzs:6OLpR8Kx2QqgwWTO6+nHSk9O1aR9s

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks