General

  • Target

    35c221cf025cde7a7289a2f888afc3e7 (3).apk

  • Size

    42.0MB

  • Sample

    240614-lszhnsygjr

  • MD5

    a87a0a5d718c1bdc899b3aa3586ee00b

  • SHA1

    5df5ce35fc4520b50a01d91845e0e29f2312d2d0

  • SHA256

    d2aa5a316d603e23e437ffa565dad19e8af231537c900579e3e16dccf7d89837

  • SHA512

    b17fc6e7d6e693fc21763dec8f04419ba9e4cdb6e7918f0727fd81504755c1a11143a53c824812b9547f946e1565d5599bb54f8b20a7732413d1e2cac1af5467

  • SSDEEP

    786432:0ruQ5+PHwXnDk3IflNNmRc/IBEdMAZ3wqia0gIJv95e90ZE2jF9/LDsk:0bMUnDkYflNN/ME5wDa1IJv9zE2Hnsk

Malware Config

Targets

    • Target

      35c221cf025cde7a7289a2f888afc3e7 (3).apk

    • Size

      42.0MB

    • MD5

      a87a0a5d718c1bdc899b3aa3586ee00b

    • SHA1

      5df5ce35fc4520b50a01d91845e0e29f2312d2d0

    • SHA256

      d2aa5a316d603e23e437ffa565dad19e8af231537c900579e3e16dccf7d89837

    • SHA512

      b17fc6e7d6e693fc21763dec8f04419ba9e4cdb6e7918f0727fd81504755c1a11143a53c824812b9547f946e1565d5599bb54f8b20a7732413d1e2cac1af5467

    • SSDEEP

      786432:0ruQ5+PHwXnDk3IflNNmRc/IBEdMAZ3wqia0gIJv95e90ZE2jF9/LDsk:0bMUnDkYflNN/ME5wDa1IJv9zE2Hnsk

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks