General

  • Target

    a98a224b644d3d88eed27aa05548a41e0178dba93ed9145250f61912e924b3e9

  • Size

    1.1MB

  • Sample

    240410-qktdxacb9w

  • MD5

    6b69a9bf30d76c135db369956774f2cb

  • SHA1

    22f49fa7fe1506d2639f08e9ae198e262396c052

  • SHA256

    a98a224b644d3d88eed27aa05548a41e0178dba93ed9145250f61912e924b3e9

  • SHA512

    2df561ffe8b9d8ce3ab6b1a5b1eccb4312e7230fa20c4da451e76cdb53e94169ffc4b2fbc0a09fe45ca6e5551921ba51670c087b0eb899ccc9206186ec0b83dd

  • SSDEEP

    24576:idX3e1cFTNITHE4Uo+N6SSmZ1e8+wyJ8Doj562FuNGlhlsdbC/lwU6Xf:idneJTZrq6XmZ8ZwEsMuNGl3OmSXf

Malware Config

Targets

    • Target

      a98a224b644d3d88eed27aa05548a41e0178dba93ed9145250f61912e924b3e9

    • Size

      1.1MB

    • MD5

      6b69a9bf30d76c135db369956774f2cb

    • SHA1

      22f49fa7fe1506d2639f08e9ae198e262396c052

    • SHA256

      a98a224b644d3d88eed27aa05548a41e0178dba93ed9145250f61912e924b3e9

    • SHA512

      2df561ffe8b9d8ce3ab6b1a5b1eccb4312e7230fa20c4da451e76cdb53e94169ffc4b2fbc0a09fe45ca6e5551921ba51670c087b0eb899ccc9206186ec0b83dd

    • SSDEEP

      24576:idX3e1cFTNITHE4Uo+N6SSmZ1e8+wyJ8Doj562FuNGlhlsdbC/lwU6Xf:idneJTZrq6XmZ8ZwEsMuNGl3OmSXf

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks