General
-
Target
9146e0ede1c0e9014341ef0859ca62d230bea5d6535d800591a796e8dfe1dff9
-
Size
2.9MB
-
Sample
240410-pwz56afh88
-
MD5
5ef94cbc5a182cba6d65ec6884e98a21
-
SHA1
4f8145805eec0c4d8fc32b020744d4f3f1e39ccb
-
SHA256
9146e0ede1c0e9014341ef0859ca62d230bea5d6535d800591a796e8dfe1dff9
-
SHA512
ed8ce47c881bcb456026c5827fc5b9aeb9a412d709e5b9a60e247b9fc041a62ad7e29980007cfa5f960375960924901e95fef9d2d8d0f8a86d4c57ba2f68f90c
-
SSDEEP
49152:CCSq3bA25W0D04emo5SvbDuQmYs6uRMA7QqywT0EdyqDVpZfVJQ:5j3/I42SDFmLQLkzDVpfu
Behavioral task
behavioral1
Sample
9146e0ede1c0e9014341ef0859ca62d230bea5d6535d800591a796e8dfe1dff9.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
9146e0ede1c0e9014341ef0859ca62d230bea5d6535d800591a796e8dfe1dff9.apk
Resource
android-33-x64-arm64-20240229-en
Malware Config
Targets
-
-
Target
9146e0ede1c0e9014341ef0859ca62d230bea5d6535d800591a796e8dfe1dff9
-
Size
2.9MB
-
MD5
5ef94cbc5a182cba6d65ec6884e98a21
-
SHA1
4f8145805eec0c4d8fc32b020744d4f3f1e39ccb
-
SHA256
9146e0ede1c0e9014341ef0859ca62d230bea5d6535d800591a796e8dfe1dff9
-
SHA512
ed8ce47c881bcb456026c5827fc5b9aeb9a412d709e5b9a60e247b9fc041a62ad7e29980007cfa5f960375960924901e95fef9d2d8d0f8a86d4c57ba2f68f90c
-
SSDEEP
49152:CCSq3bA25W0D04emo5SvbDuQmYs6uRMA7QqywT0EdyqDVpZfVJQ:5j3/I42SDFmLQLkzDVpfu
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2