General

  • Target

    6fd2da0fe37e344f7b77e5e254f27ecb3ac0589b0cf48a38be8d8979ce30d760.apk

  • Size

    3.1MB

  • Sample

    240409-by58asdg8s

  • MD5

    517a17f9253fe1bddd700e4002cd80c9

  • SHA1

    05711eb4f4b77b7c11feb45ab4614e73cf6302a3

  • SHA256

    6fd2da0fe37e344f7b77e5e254f27ecb3ac0589b0cf48a38be8d8979ce30d760

  • SHA512

    d1104c2cb606e3a6225980097d9a399e69c6b5bf79b592d4426f822311d8fb84382ec7551a578800e6f9ea81a51ec33a40e6d01c07fd664c62ccda6c15d0c292

  • SSDEEP

    49152:tKwh+nAALP8KO2x1K1J2FT/V9WZuT8MK+0PbnNIeQptcjkxXX2Tnj:tKwQntLP86a1kbI8oA0Pbn8fekNcj

Malware Config

Targets

    • Target

      6fd2da0fe37e344f7b77e5e254f27ecb3ac0589b0cf48a38be8d8979ce30d760.apk

    • Size

      3.1MB

    • MD5

      517a17f9253fe1bddd700e4002cd80c9

    • SHA1

      05711eb4f4b77b7c11feb45ab4614e73cf6302a3

    • SHA256

      6fd2da0fe37e344f7b77e5e254f27ecb3ac0589b0cf48a38be8d8979ce30d760

    • SHA512

      d1104c2cb606e3a6225980097d9a399e69c6b5bf79b592d4426f822311d8fb84382ec7551a578800e6f9ea81a51ec33a40e6d01c07fd664c62ccda6c15d0c292

    • SSDEEP

      49152:tKwh+nAALP8KO2x1K1J2FT/V9WZuT8MK+0PbnNIeQptcjkxXX2Tnj:tKwQntLP86a1kbI8oA0Pbn8fekNcj

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks