Resubmissions

07-07-2024 23:18

240707-3ak11a1ekq 10

01-07-2024 22:20

240701-182ejaxcjm 10

01-07-2024 22:08

240701-12n6masfrb 7

General

  • Target

    app-release.apk

  • Size

    3.5MB

  • Sample

    240707-3ak11a1ekq

  • MD5

    b023ee162270c73767beb40e0c13d1b9

  • SHA1

    09fe475b1125397c8920b28e711314426c894480

  • SHA256

    2a9287911eea92821cdf5cbe945605ce2f654308c48fe213d271cfabb7f528c0

  • SHA512

    268235c93ba2b752d8c5deef197e75dfd2b91a22c748ef99bfc0eefdeeba6c74a0c37b8ff6c62055d63f4875578b896365f4305f6bab716a666f5c951a6f7e87

  • SSDEEP

    49152:WDQ5V+cnNAeN53Nfzq0e8HWXx7F9S+BLnynNRvY6VyLT9xx5t/gcQTronoSdWxtg:eIV7n5Jz/eVB7r0NR30LT9Bti4AckFo

Score
10/10

Malware Config

Targets

    • Target

      app-release.apk

    • Size

      3.5MB

    • MD5

      b023ee162270c73767beb40e0c13d1b9

    • SHA1

      09fe475b1125397c8920b28e711314426c894480

    • SHA256

      2a9287911eea92821cdf5cbe945605ce2f654308c48fe213d271cfabb7f528c0

    • SHA512

      268235c93ba2b752d8c5deef197e75dfd2b91a22c748ef99bfc0eefdeeba6c74a0c37b8ff6c62055d63f4875578b896365f4305f6bab716a666f5c951a6f7e87

    • SSDEEP

      49152:WDQ5V+cnNAeN53Nfzq0e8HWXx7F9S+BLnynNRvY6VyLT9xx5t/gcQTronoSdWxtg:eIV7n5Jz/eVB7r0NR30LT9Bti4AckFo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks