General

  • Target

    Chrome.apk

  • Size

    4.4MB

  • Sample

    220609-mrnkfsfbdn

  • MD5

    65f634ef24fd686225aa4765fc63fe2b

  • SHA1

    fe4a7d079cc00e730412c7a6e0b177829ee58a73

  • SHA256

    f4d18662c927380a2d30eba367fafd3746fa137df499cb50d49e591a420aa95d

  • SHA512

    1dfd4069dc664d6062c76a49c0925b7bf0ecf7fda8bd345fe5980100bc413f93e2853e0be9e89db03b42de90c0d8017f31c17f73470462345c31d50a7a6c47fe

Malware Config

Targets

    • Target

      Chrome.apk

    • Size

      4.4MB

    • MD5

      65f634ef24fd686225aa4765fc63fe2b

    • SHA1

      fe4a7d079cc00e730412c7a6e0b177829ee58a73

    • SHA256

      f4d18662c927380a2d30eba367fafd3746fa137df499cb50d49e591a420aa95d

    • SHA512

      1dfd4069dc664d6062c76a49c0925b7bf0ecf7fda8bd345fe5980100bc413f93e2853e0be9e89db03b42de90c0d8017f31c17f73470462345c31d50a7a6c47fe

    Score
    8/10
    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks