General

  • Target

    9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394

  • Size

    9.4MB

  • Sample

    240416-l44lrsfe33

  • MD5

    e0140d7409d8ea55cb1f910e56ecb5c0

  • SHA1

    be189a5e2dc84f27111114c5eb357bc02ff820dc

  • SHA256

    9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394

  • SHA512

    e2e14be5f2f3539f3f54d66534b9d83f94cff1ad6100fcdee2dee7d9b70ff8251d48b44015e9bfd2ad5a382552322b32af5398824bcdf002b636cd03a7b37255

  • SSDEEP

    196608:cB61MHXP+yV2GeNMpeRjO3O+DsCWR6FNfrjLbu/X0gR:cuOXP+U2GeNo3xsCWR6vfrvC/kI

Malware Config

Targets

    • Target

      9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394

    • Size

      9.4MB

    • MD5

      e0140d7409d8ea55cb1f910e56ecb5c0

    • SHA1

      be189a5e2dc84f27111114c5eb357bc02ff820dc

    • SHA256

      9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394

    • SHA512

      e2e14be5f2f3539f3f54d66534b9d83f94cff1ad6100fcdee2dee7d9b70ff8251d48b44015e9bfd2ad5a382552322b32af5398824bcdf002b636cd03a7b37255

    • SSDEEP

      196608:cB61MHXP+yV2GeNMpeRjO3O+DsCWR6FNfrjLbu/X0gR:cuOXP+U2GeNo3xsCWR6vfrvC/kI

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks