General
-
Target
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
Size
2.9MB
-
Sample
240410-nxmqsaee48
-
MD5
b0c5b2b4d6678c9faa5140a040a1ab73
-
SHA1
ca101ddfcf6746ffa171dc3a0545ebd017bf689a
-
SHA256
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
SHA512
4ac35472e292b4491e96d32ccd73f73fef10ed90070bcc16d1c69b0c800762a47fde01871a75274b2036eeb76705767c9a4d282e1f57bf55931da9011195e2fd
-
SSDEEP
49152:duRML7jNf7mUqyKD/09lXUKhoHvoiUc/l9tZ5yHKhs76ry5K+X6j1VHzfjqD:1jN7xLG/Ul70RUcN9tXkj7eH+Xu1JzfS
Behavioral task
behavioral1
Sample
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba.apk
Resource
android-33-x64-arm64-20240229-en
Malware Config
Targets
-
-
Target
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
Size
2.9MB
-
MD5
b0c5b2b4d6678c9faa5140a040a1ab73
-
SHA1
ca101ddfcf6746ffa171dc3a0545ebd017bf689a
-
SHA256
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
SHA512
4ac35472e292b4491e96d32ccd73f73fef10ed90070bcc16d1c69b0c800762a47fde01871a75274b2036eeb76705767c9a4d282e1f57bf55931da9011195e2fd
-
SSDEEP
49152:duRML7jNf7mUqyKD/09lXUKhoHvoiUc/l9tZ5yHKhs76ry5K+X6j1VHzfjqD:1jN7xLG/Ul70RUcN9tXkj7eH+Xu1JzfS
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2