General

  • Target

    e4ae665f7144d07c1b558fdd84372a231ec69921864cff7d421d84955ebbe6a2.bin

  • Size

    20KB

  • MD5

    ce7f5527f66b4fb2be582704c3a89402

  • SHA1

    108c9217371ff293df33a6855e4cd4a714017519

  • SHA256

    e4ae665f7144d07c1b558fdd84372a231ec69921864cff7d421d84955ebbe6a2

  • SHA512

    54ac6a731323df49bb24539f632a9422d6b49bd7e1946a40fc0586d17c8faee4de69f9be4592a8cae3cc3da491073930a98a44609a92c039d9bcfcaba2d9abd0

  • SSDEEP

    384:g9DRd7nKF//8/tW+6FUv7QDoa3YpYRQtFS6lZGo/LWn7wH0nGxl2ybSyNyb2yv3:2DXK6G+DQ8aIp9tsgZDDWn7wH7VlwhP

Score
10/10

Malware Config

Extracted

Family

metasploit

C2

tcp://127.0.0.1:4444

Signatures

  • Metasploit family
  • Metasploit payload 1 IoCs
  • Requests dangerous framework permissions 15 IoCs

Files

  • e4ae665f7144d07c1b558fdd84372a231ec69921864cff7d421d84955ebbe6a2.bin
    .apk android

    com.chrome.stage

    .MainActivity


Android Permissions

e4ae665f7144d07c1b558fdd84372a231ec69921864cff7d421d84955ebbe6a2.bin

Permissions

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_FINE_LOCATION

android.permission.READ_PHONE_STATE

android.permission.SEND_SMS

android.permission.RECEIVE_SMS

android.permission.RECORD_AUDIO

android.permission.CALL_PHONE

android.permission.READ_CONTACTS

android.permission.WRITE_CONTACTS

android.permission.WRITE_SETTINGS

android.permission.CAMERA

android.permission.READ_SMS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.SET_WALLPAPER

android.permission.READ_CALL_LOG

android.permission.WRITE_CALL_LOG

android.permission.WAKE_LOCK

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS