General

  • Target

    cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37

  • Size

    11.8MB

  • Sample

    240416-l7wekaff69

  • MD5

    7e58274d23ebaca3f9ce6da7d2b7a8ae

  • SHA1

    ccc078c929d3628188c4cc5a2bd9862c368b7fda

  • SHA256

    cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37

  • SHA512

    c0b750b16cbcaf2c18d68cd516e0ba02d4d2bc0875ccad6981ce0af2f1b7ed6129bfee9aabf45f02c002a1b50c342b27891bb81f80b8e569ecd1553d3cee9918

  • SSDEEP

    196608:KlkjdqPLQ4vs40WHNVXlVvjq8Tky5Q7NMpeRjO3A+DsCkhYWycvJrgRYqNVg:K3PLQ4vkClVG8TkkINo33sCkmWycvJrl

Malware Config

Targets

    • Target

      cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37

    • Size

      11.8MB

    • MD5

      7e58274d23ebaca3f9ce6da7d2b7a8ae

    • SHA1

      ccc078c929d3628188c4cc5a2bd9862c368b7fda

    • SHA256

      cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37

    • SHA512

      c0b750b16cbcaf2c18d68cd516e0ba02d4d2bc0875ccad6981ce0af2f1b7ed6129bfee9aabf45f02c002a1b50c342b27891bb81f80b8e569ecd1553d3cee9918

    • SSDEEP

      196608:KlkjdqPLQ4vs40WHNVXlVvjq8Tky5Q7NMpeRjO3A+DsCkhYWycvJrgRYqNVg:K3PLQ4vkClVG8TkkINo33sCkmWycvJrl

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks