Resubmissions

12-04-2024 07:27

240412-jac6lsgf95 10

20-12-2023 11:50

231220-nzvt6sade8 10

General

  • Target

    ae56c32ca785a39cd513c3b69d4d31aff6969fbe87ddc6606002e1cdcfe49b12

  • Size

    6.2MB

  • Sample

    240412-jac6lsgf95

  • MD5

    b451af80f8d6b255bf36d03976f140c5

  • SHA1

    72b127983d70f79e366a2a1bc0b2d95af9e58d3f

  • SHA256

    ae56c32ca785a39cd513c3b69d4d31aff6969fbe87ddc6606002e1cdcfe49b12

  • SHA512

    93ff057aee089c4f8b97633d5f0166d2d0f7c73199d6c876a10f585250ae20ca154cf2248e6d4201bf54595740465d9a27380051e3f88d8084082a7e23d0eeb8

  • SSDEEP

    196608:/9gioLpNX0aJoDigoI7QJ6WPqMbTojj/xovcL6/Rq://8pNX0pigoGYrPquTUjZovcL6/Rq

Malware Config

Targets

    • Target

      ae56c32ca785a39cd513c3b69d4d31aff6969fbe87ddc6606002e1cdcfe49b12

    • Size

      6.2MB

    • MD5

      b451af80f8d6b255bf36d03976f140c5

    • SHA1

      72b127983d70f79e366a2a1bc0b2d95af9e58d3f

    • SHA256

      ae56c32ca785a39cd513c3b69d4d31aff6969fbe87ddc6606002e1cdcfe49b12

    • SHA512

      93ff057aee089c4f8b97633d5f0166d2d0f7c73199d6c876a10f585250ae20ca154cf2248e6d4201bf54595740465d9a27380051e3f88d8084082a7e23d0eeb8

    • SSDEEP

      196608:/9gioLpNX0aJoDigoI7QJ6WPqMbTojj/xovcL6/Rq://8pNX0pigoGYrPquTUjZovcL6/Rq

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries account information for other applications stored on the device.

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks