General

  • Target

    56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5

  • Size

    10.8MB

  • Sample

    240404-py47wsga2s

  • MD5

    fa616996d4a0c3a1f2c7386a325951f1

  • SHA1

    9291972c813ef1eaa9f631394a66c6b7dfc24601

  • SHA256

    56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5

  • SHA512

    1feea52839fdacd89b27752e3a8c6706ad43f655c5a2b82f572c269b6926af7d647d947f9580d895a03e17399c1299a5fdd6a0d356047899e76c2749bb980f08

  • SSDEEP

    196608:LOtdZllctE90ibCyCxJcpPNMpeRjO36+DsC/JlYx83OIopQGPX:LO5ctEZWOPNo3NsCBCiObpR/

Malware Config

Targets

    • Target

      56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5

    • Size

      10.8MB

    • MD5

      fa616996d4a0c3a1f2c7386a325951f1

    • SHA1

      9291972c813ef1eaa9f631394a66c6b7dfc24601

    • SHA256

      56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5

    • SHA512

      1feea52839fdacd89b27752e3a8c6706ad43f655c5a2b82f572c269b6926af7d647d947f9580d895a03e17399c1299a5fdd6a0d356047899e76c2749bb980f08

    • SSDEEP

      196608:LOtdZllctE90ibCyCxJcpPNMpeRjO36+DsC/JlYx83OIopQGPX:LO5ctEZWOPNo3NsCBCiObpR/

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks