Resubmissions

23/02/2024, 08:55

240223-kvncraee55 8

23/02/2024, 08:48

240223-kqh78sdh7z 7

General

  • Target

    trendyol-7-18-4-779.apk

  • Size

    96.7MB

  • Sample

    240223-kvncraee55

  • MD5

    8b8b2ab8a040e3c3e7491b85137e7554

  • SHA1

    d7b2ca247c7d1d193a3eacda8e4107b27c4074f1

  • SHA256

    4caf390ac0dad1a88c1cc717adbd97b8ad7289ff2ad9d4340b1a0c7bb23a82bc

  • SHA512

    b7e5d4cde370588eee72d15330d040e4998644dcff931d3ae01ef70b305fca3c184f75bd4073434e5c69563f4fd3aa24de7f273dec5c923da75f7bbd6e8546ee

  • SSDEEP

    3145728:Z9zYR9yc+K34ldj0XynY1jBP+dx1cN6jUW2Gl+HbKfJ:Z9zYnv+KCdA4YByarGBJ

Malware Config

Targets

    • Target

      trendyol-7-18-4-779.apk

    • Size

      96.7MB

    • MD5

      8b8b2ab8a040e3c3e7491b85137e7554

    • SHA1

      d7b2ca247c7d1d193a3eacda8e4107b27c4074f1

    • SHA256

      4caf390ac0dad1a88c1cc717adbd97b8ad7289ff2ad9d4340b1a0c7bb23a82bc

    • SHA512

      b7e5d4cde370588eee72d15330d040e4998644dcff931d3ae01ef70b305fca3c184f75bd4073434e5c69563f4fd3aa24de7f273dec5c923da75f7bbd6e8546ee

    • SSDEEP

      3145728:Z9zYR9yc+K34ldj0XynY1jBP+dx1cN6jUW2Gl+HbKfJ:Z9zYnv+KCdA4YByarGBJ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks