General

  • Target

    32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5.apk

  • Size

    10.1MB

  • Sample

    240319-cnhjxsef42

  • MD5

    20510fb9fdcf0a6657a79805eca2b681

  • SHA1

    4c0163d7e6cdcf50c76aad1be16e08c0625c7d19

  • SHA256

    32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5

  • SHA512

    8c6ae9c94c68adf02148a070a6a4aa5e7b3e86504e61a16d7d1f90c4f99a136ee1d024e184f803967c4a3ee9c7faa3ac35c6ab8af491ac79bfcc711f74f84422

  • SSDEEP

    196608:1QPrDHA4VPNNtWiYIfNyjRwxySOB4cmFICAZMjL/BrvA6rA3h6v4SkjKCQ7S:1QPP1PRNyt9BcFIC0M26rA3Q1E

Malware Config

Targets

    • Target

      32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5.apk

    • Size

      10.1MB

    • MD5

      20510fb9fdcf0a6657a79805eca2b681

    • SHA1

      4c0163d7e6cdcf50c76aad1be16e08c0625c7d19

    • SHA256

      32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5

    • SHA512

      8c6ae9c94c68adf02148a070a6a4aa5e7b3e86504e61a16d7d1f90c4f99a136ee1d024e184f803967c4a3ee9c7faa3ac35c6ab8af491ac79bfcc711f74f84422

    • SSDEEP

      196608:1QPrDHA4VPNNtWiYIfNyjRwxySOB4cmFICAZMjL/BrvA6rA3h6v4SkjKCQ7S:1QPP1PRNyt9BcFIC0M26rA3Q1E

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks