General

  • Target

    d5bf6c021c637800f5005d5b8ce4ecf907d28c3abf33ac7db206e034de3b205a

  • Size

    2.0MB

  • Sample

    240404-p14n5sgb4w

  • MD5

    c57e2fd2b40e4258037fece79e509099

  • SHA1

    434b2a1435cb4881409dd16573c57b2db6e388aa

  • SHA256

    d5bf6c021c637800f5005d5b8ce4ecf907d28c3abf33ac7db206e034de3b205a

  • SHA512

    f88f19291d906b3bd1160ff9ac76921a022251d7ff90e174c632d77610fcbf3af1c3362dbbb9f5fab3fd0b4ed10e22fec3ff921770795cbafff646a57eb2e5ce

  • SSDEEP

    49152:7K2v+klnKZ6oLF9kLV/tmspxrFZR5L7wRXNK75AaEjZ:e2p8/kh48rjR5PqdDaEjZ

Malware Config

Targets

    • Target

      d5bf6c021c637800f5005d5b8ce4ecf907d28c3abf33ac7db206e034de3b205a

    • Size

      2.0MB

    • MD5

      c57e2fd2b40e4258037fece79e509099

    • SHA1

      434b2a1435cb4881409dd16573c57b2db6e388aa

    • SHA256

      d5bf6c021c637800f5005d5b8ce4ecf907d28c3abf33ac7db206e034de3b205a

    • SHA512

      f88f19291d906b3bd1160ff9ac76921a022251d7ff90e174c632d77610fcbf3af1c3362dbbb9f5fab3fd0b4ed10e22fec3ff921770795cbafff646a57eb2e5ce

    • SSDEEP

      49152:7K2v+klnKZ6oLF9kLV/tmspxrFZR5L7wRXNK75AaEjZ:e2p8/kh48rjR5PqdDaEjZ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks