General

  • Target

    0230783fd8557685df5334e84f2fa437.apk

  • Size

    38.6MB

  • MD5

    0230783fd8557685df5334e84f2fa437

  • SHA1

    572377fe51f2224328861b1b70e7735790441ad4

  • SHA256

    ce0ef4122015076b9dd65a6ce0c76b7acaf0fd891b3d84bd7ccc3b15393a6508

  • SHA512

    b0bb0448bc7f1ae74b63ba2027c015d021990200bf0b17f0544ce41a23ba17adc2b8f5058a9f44d02aa53ea1593b27deec4af7e538c24418c71ff42abd696419

  • SSDEEP

    786432:yVRMg3zAmwc2OG3KnTc+SYREzj0hFFwf3XSn:mzxwgTSgEzj0hI3XSn

Malware Config

Signatures

  • 888rat family
  • Android 888 RAT payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Office document contains embedded OLE objects 1 IoCs

    Detected embedded OLE objects in Office documents.

Files

  • 0230783fd8557685df5334e84f2fa437.apk
    .js