General

  • Target

    6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12

  • Size

    13.8MB

  • Sample

    240404-p1ep1sga8v

  • MD5

    f29e6ec4603356f313a30879455ca758

  • SHA1

    305f6865daceef5f150679b76f969c1c3970314f

  • SHA256

    6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12

  • SHA512

    ed109f4480d9fc9758ea424c750bfc78fa234b1a2794714fec51f2c7a467537e599c594d9870194aeb693f17a23889675e8e895de0ef7b0a8c0b37c67a5fa080

  • SSDEEP

    393216:h4/vdvWvIfLoJ0+2o8j5D5i5jK8sCOx9WXPNTKtU:y1vGOU+XjtSjKXGpK6

Malware Config

Targets

    • Target

      6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12

    • Size

      13.8MB

    • MD5

      f29e6ec4603356f313a30879455ca758

    • SHA1

      305f6865daceef5f150679b76f969c1c3970314f

    • SHA256

      6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12

    • SHA512

      ed109f4480d9fc9758ea424c750bfc78fa234b1a2794714fec51f2c7a467537e599c594d9870194aeb693f17a23889675e8e895de0ef7b0a8c0b37c67a5fa080

    • SSDEEP

      393216:h4/vdvWvIfLoJ0+2o8j5D5i5jK8sCOx9WXPNTKtU:y1vGOU+XjtSjKXGpK6

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks