General

  • Target

    46bed59a47f027598570f3ef1b7cfc0a5784f08233708529f009be49ed7c8b99

  • Size

    9.7MB

  • Sample

    240325-qrjs2scb7w

  • MD5

    9c73f1bdec6850327705fea5a6c5d8b6

  • SHA1

    9d08501fd6151c271d07d5e5eb91f2e9925d14b6

  • SHA256

    46bed59a47f027598570f3ef1b7cfc0a5784f08233708529f009be49ed7c8b99

  • SHA512

    1806cd09b457e9dc16d5580421ce47b0f6d35ae83087103161f9a79ca0a19b11bef283bc2017c517db51215e839b87ab8b53359c69286e5c91db3cc86c2fcd96

  • SSDEEP

    196608:H+DsCJNMpeRjO3OG6kvENQjDYj++iqPjhhAoA4xd7zxEuoHC:CsCJNo3qkvhEjiWjhhAafxEuoi

Malware Config

Targets

    • Target

      46bed59a47f027598570f3ef1b7cfc0a5784f08233708529f009be49ed7c8b99

    • Size

      9.7MB

    • MD5

      9c73f1bdec6850327705fea5a6c5d8b6

    • SHA1

      9d08501fd6151c271d07d5e5eb91f2e9925d14b6

    • SHA256

      46bed59a47f027598570f3ef1b7cfc0a5784f08233708529f009be49ed7c8b99

    • SHA512

      1806cd09b457e9dc16d5580421ce47b0f6d35ae83087103161f9a79ca0a19b11bef283bc2017c517db51215e839b87ab8b53359c69286e5c91db3cc86c2fcd96

    • SSDEEP

      196608:H+DsCJNMpeRjO3OG6kvENQjDYj++iqPjhhAoA4xd7zxEuoHC:CsCJNo3qkvhEjiWjhhAafxEuoi

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks