General

  • Target

    5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a

  • Size

    16.6MB

  • Sample

    240404-pzc5ssgf35

  • MD5

    e449f7cced6c77f0c11068429b53f7db

  • SHA1

    d29578b35b7b222e0001cc2fda1b149b36f38d16

  • SHA256

    5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a

  • SHA512

    fdfe78792a3122e21af8a21f7e336973ab19e0d0b3b6098ce8f45d2bf94e712d6448a95b906e342bf6e0c9f126b841b7e1f365e218c4380df46d78285c860216

  • SSDEEP

    393216:ut/4pCFQO1HtK08bu7OZbzLEGzmLqmXzhXMRBvkYEa:SQKQO1k08gOFLzE8qa

Malware Config

Targets

    • Target

      5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a

    • Size

      16.6MB

    • MD5

      e449f7cced6c77f0c11068429b53f7db

    • SHA1

      d29578b35b7b222e0001cc2fda1b149b36f38d16

    • SHA256

      5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a

    • SHA512

      fdfe78792a3122e21af8a21f7e336973ab19e0d0b3b6098ce8f45d2bf94e712d6448a95b906e342bf6e0c9f126b841b7e1f365e218c4380df46d78285c860216

    • SSDEEP

      393216:ut/4pCFQO1HtK08bu7OZbzLEGzmLqmXzhXMRBvkYEa:SQKQO1k08gOFLzE8qa

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks