General

  • Target

    Google 3D.apk

  • Size

    4.5MB

  • Sample

    240311-vcvdfsgf5s

  • MD5

    a0cea3fbf1c966ee3c73bf4703f572de

  • SHA1

    a860b2e40314049a3162692cc100f9761f87dd38

  • SHA256

    f6aaf54cc67ba89230ac4b9914b66f046b9b8a7966c682094bd45044b787998e

  • SHA512

    160ccb286fa6ace2b0cec2ef4cf7c11ac79cd712a3a6299c6da6c136117e7fea62c9fe4d20858f9a03260d2ebe472fff3b9c02d648c8e63c064a3ec34de828b9

  • SSDEEP

    98304:ZJdNvKb+h/8CYRCbXJ5tmzQzBZT20too/vV9g9/:7dNvKMZ5gzu9De

Malware Config

Targets

    • Target

      Google 3D.apk

    • Size

      4.5MB

    • MD5

      a0cea3fbf1c966ee3c73bf4703f572de

    • SHA1

      a860b2e40314049a3162692cc100f9761f87dd38

    • SHA256

      f6aaf54cc67ba89230ac4b9914b66f046b9b8a7966c682094bd45044b787998e

    • SHA512

      160ccb286fa6ace2b0cec2ef4cf7c11ac79cd712a3a6299c6da6c136117e7fea62c9fe4d20858f9a03260d2ebe472fff3b9c02d648c8e63c064a3ec34de828b9

    • SSDEEP

      98304:ZJdNvKb+h/8CYRCbXJ5tmzQzBZT20too/vV9g9/:7dNvKMZ5gzu9De

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

MITRE ATT&CK Matrix

Tasks