General

  • Target

    HappyMod-3-0-9 (1).apk

  • Size

    16.1MB

  • Sample

    240328-nrpyyshb95

  • MD5

    2c569157a85addc9e495ff2b2f1d2a57

  • SHA1

    25dd2df8ab6b09cf17c4afe85b0c10767eac7525

  • SHA256

    82ce66c59fa6532feef0ecb0bbc67eabbdb3e0225ba23b6472da85a2dd1795ff

  • SHA512

    b5fbe249b865b8ecc2b93e9d3083a181138bbff721e7428249c4b4cb30afd2a914349b4ab3192f292bd44c5708b65e76d9ad0a66ed4d03602e7b2ddac6ed9744

  • SSDEEP

    393216:Dp0TcbMT8jhcEb7NYivQBSWALHi9mD41cnhVS3dxS:DacQT8cE+iIYLJmOhVS3dA

Malware Config

Targets

    • Target

      HappyMod-3-0-9 (1).apk

    • Size

      16.1MB

    • MD5

      2c569157a85addc9e495ff2b2f1d2a57

    • SHA1

      25dd2df8ab6b09cf17c4afe85b0c10767eac7525

    • SHA256

      82ce66c59fa6532feef0ecb0bbc67eabbdb3e0225ba23b6472da85a2dd1795ff

    • SHA512

      b5fbe249b865b8ecc2b93e9d3083a181138bbff721e7428249c4b4cb30afd2a914349b4ab3192f292bd44c5708b65e76d9ad0a66ed4d03602e7b2ddac6ed9744

    • SSDEEP

      393216:Dp0TcbMT8jhcEb7NYivQBSWALHi9mD41cnhVS3dxS:DacQT8cE+iIYLJmOhVS3dA

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks