General

  • Target

    ad5ae6c692720b26e76cd59f60fbb351

  • Size

    16.7MB

  • Sample

    240229-bybcxsad98

  • MD5

    ad5ae6c692720b26e76cd59f60fbb351

  • SHA1

    b10059af4dfa321e48e8c2bab4413378069d918f

  • SHA256

    8213d26837420ed3216c44dfbb00fe3af81a7e65864d6a77b6b5d0b94419efd2

  • SHA512

    fb8b0b8eb372b827f50d103c846279387c55bde625a2adf641373fcfe4d58c836135f8c983228a790348eed57ef57fcdadf09a191f9f4bfbd310c05900bf02e6

  • SSDEEP

    393216:oJIhK81VVnXlEzUgaXSrfRmkJrLwjyVL8VuK9LwjeqzK:oiVVnV41airgkKPt9Zd

Malware Config

Targets

    • Target

      ad5ae6c692720b26e76cd59f60fbb351

    • Size

      16.7MB

    • MD5

      ad5ae6c692720b26e76cd59f60fbb351

    • SHA1

      b10059af4dfa321e48e8c2bab4413378069d918f

    • SHA256

      8213d26837420ed3216c44dfbb00fe3af81a7e65864d6a77b6b5d0b94419efd2

    • SHA512

      fb8b0b8eb372b827f50d103c846279387c55bde625a2adf641373fcfe4d58c836135f8c983228a790348eed57ef57fcdadf09a191f9f4bfbd310c05900bf02e6

    • SSDEEP

      393216:oJIhK81VVnXlEzUgaXSrfRmkJrLwjyVL8VuK9LwjeqzK:oiVVnV41airgkKPt9Zd

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks