General

  • Target

    137e50abfcd0ddb4cdd8d11c595b06359c2e087aaddcee6a308e6e258c6dd4f3

  • Size

    9.5MB

  • Sample

    240404-p1slwagb2s

  • MD5

    75938b9098bcffea630d693344701e90

  • SHA1

    6bbcde17b2f4b1aebb4e2d334698bbb9adf075f7

  • SHA256

    137e50abfcd0ddb4cdd8d11c595b06359c2e087aaddcee6a308e6e258c6dd4f3

  • SHA512

    732e659e1c09d04dba39ad89d7aefee2f888736acee5f2cb9659ea09fbaf35cd0577d51b1b40081de5b2a64c565f7d6a78c3da984dd00f432c7d6469f07bdb98

  • SSDEEP

    196608:gJptragAqtdtiC0+DsCwNMpeRjO3RMkRdCCbX6iRCK:S/H7bsCwNo3O4dCCbdRCK

Malware Config

Targets

    • Target

      137e50abfcd0ddb4cdd8d11c595b06359c2e087aaddcee6a308e6e258c6dd4f3

    • Size

      9.5MB

    • MD5

      75938b9098bcffea630d693344701e90

    • SHA1

      6bbcde17b2f4b1aebb4e2d334698bbb9adf075f7

    • SHA256

      137e50abfcd0ddb4cdd8d11c595b06359c2e087aaddcee6a308e6e258c6dd4f3

    • SHA512

      732e659e1c09d04dba39ad89d7aefee2f888736acee5f2cb9659ea09fbaf35cd0577d51b1b40081de5b2a64c565f7d6a78c3da984dd00f432c7d6469f07bdb98

    • SSDEEP

      196608:gJptragAqtdtiC0+DsCwNMpeRjO3RMkRdCCbX6iRCK:S/H7bsCwNo3O4dCCbdRCK

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks