General

  • Target

    14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183

  • Size

    11.4MB

  • Sample

    240404-pxw5wsfh5z

  • MD5

    59e33709770511ff6172fd50a37ec22b

  • SHA1

    a6efd3085e385d1075eeef1ad8f669f890af5039

  • SHA256

    14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183

  • SHA512

    2b31d2958b805d6319fce2497997bdc2e35f01ec57e47670bc4298dbc4522a2b7b153d2bb2a8390de731366e68f248b577c5a58de47c391d06c5b6a7da44d1a1

  • SSDEEP

    196608:a+DsCfNMpeRjO3ASbzpLclK+3VJnLQnbkazMD2bm0WArhzALFwvUcxn8S:tsCfNo3A8zpeDldcbdrq0nYFMUxS

Malware Config

Targets

    • Target

      14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183

    • Size

      11.4MB

    • MD5

      59e33709770511ff6172fd50a37ec22b

    • SHA1

      a6efd3085e385d1075eeef1ad8f669f890af5039

    • SHA256

      14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183

    • SHA512

      2b31d2958b805d6319fce2497997bdc2e35f01ec57e47670bc4298dbc4522a2b7b153d2bb2a8390de731366e68f248b577c5a58de47c391d06c5b6a7da44d1a1

    • SSDEEP

      196608:a+DsCfNMpeRjO3ASbzpLclK+3VJnLQnbkazMD2bm0WArhzALFwvUcxn8S:tsCfNo3A8zpeDldcbdrq0nYFMUxS

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks