General

  • Target

    b6e609c7785d9d8e9efe4e5f3eaa62c57a7df1ab9ac7520f2f2cb9b735e77073

  • Size

    13.7MB

  • Sample

    240416-l1hj5afb97

  • MD5

    92eb6e7834d6bd9a26a7cf2c799453b0

  • SHA1

    f31095a80af3a565b0900a457f56ebda157d617e

  • SHA256

    b6e609c7785d9d8e9efe4e5f3eaa62c57a7df1ab9ac7520f2f2cb9b735e77073

  • SHA512

    93057f4c88b85a5cf23c52a2edf52d01b9820a520aa82ad7e294a94c437b68e65aac331cc65f5b54c761ce3938354d0c9f89fe547f42758c89ed95e0af1c4a8b

  • SSDEEP

    393216:UWAIVwhQkgcAV/6ZLBNo34sCeN6IECEPaR/:UwbkgcAUVBEjUC0aR/

Malware Config

Targets

    • Target

      b6e609c7785d9d8e9efe4e5f3eaa62c57a7df1ab9ac7520f2f2cb9b735e77073

    • Size

      13.7MB

    • MD5

      92eb6e7834d6bd9a26a7cf2c799453b0

    • SHA1

      f31095a80af3a565b0900a457f56ebda157d617e

    • SHA256

      b6e609c7785d9d8e9efe4e5f3eaa62c57a7df1ab9ac7520f2f2cb9b735e77073

    • SHA512

      93057f4c88b85a5cf23c52a2edf52d01b9820a520aa82ad7e294a94c437b68e65aac331cc65f5b54c761ce3938354d0c9f89fe547f42758c89ed95e0af1c4a8b

    • SSDEEP

      393216:UWAIVwhQkgcAV/6ZLBNo34sCeN6IECEPaR/:UwbkgcAUVBEjUC0aR/

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks