General

  • Target

    eb99335e3cb1bed90f7e8bcc9e7d7fc72b43d0ed31b1e2ca7f35325e08595e9f.bin

  • Size

    506KB

  • Sample

    240310-11alvadb3w

  • MD5

    c5f46fc5b51cf0b36234144034239a8a

  • SHA1

    e893638ba3f379f6b3ce7a1421f8c2575ad89740

  • SHA256

    eb99335e3cb1bed90f7e8bcc9e7d7fc72b43d0ed31b1e2ca7f35325e08595e9f

  • SHA512

    96ebe3261034c836c9bc6a093f0573b13ac5a620172dbf30e4a3282a24f47056ab5998c7fd0dd9d37c554cdd9471e0aa54fdaa63d31f39b66d9eac3c61b46b61

  • SSDEEP

    12288:Ks2hTgjSg8c2yMGhcZ+pzYp3teE7q93teE7q93teE7q93teE7quY:K9hSS26Z+pMp3Yz93Yz93Yz93YzuY

Malware Config

Targets

    • Target

      eb99335e3cb1bed90f7e8bcc9e7d7fc72b43d0ed31b1e2ca7f35325e08595e9f.bin

    • Size

      506KB

    • MD5

      c5f46fc5b51cf0b36234144034239a8a

    • SHA1

      e893638ba3f379f6b3ce7a1421f8c2575ad89740

    • SHA256

      eb99335e3cb1bed90f7e8bcc9e7d7fc72b43d0ed31b1e2ca7f35325e08595e9f

    • SHA512

      96ebe3261034c836c9bc6a093f0573b13ac5a620172dbf30e4a3282a24f47056ab5998c7fd0dd9d37c554cdd9471e0aa54fdaa63d31f39b66d9eac3c61b46b61

    • SSDEEP

      12288:Ks2hTgjSg8c2yMGhcZ+pzYp3teE7q93teE7q93teE7q93teE7quY:K9hSS26Z+pMp3Yz93Yz93Yz93YzuY

    • Removes its main activity from the application launcher

    • Checks Android system properties for emulator presence.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks