General

  • Target

    41bf45ad0995683fe4cec9113ed17cc33f3c5ad9416a9cc53f1fda5e93d1bd79

  • Size

    14.7MB

  • Sample

    240416-l875rahe9y

  • MD5

    12767ca745bb3e3064e1f6a7138d9770

  • SHA1

    1a585bc8c66e1dbc5b0813e36b9287f543bcb726

  • SHA256

    41bf45ad0995683fe4cec9113ed17cc33f3c5ad9416a9cc53f1fda5e93d1bd79

  • SHA512

    07808bca038d4f03739fe61f3e130cb49c02f6b075dec795852084d50bd2fdee19565c71009f2dee8c72ddf85c0b332e1ca3b3e6934430fd6e87eb720fbb4738

  • SSDEEP

    393216:4sCeNo3ywhCYNGFhBbCJm+DXsB6tDkz1Pp/:j/E3hD8LBF+jxtYj/

Malware Config

Targets

    • Target

      41bf45ad0995683fe4cec9113ed17cc33f3c5ad9416a9cc53f1fda5e93d1bd79

    • Size

      14.7MB

    • MD5

      12767ca745bb3e3064e1f6a7138d9770

    • SHA1

      1a585bc8c66e1dbc5b0813e36b9287f543bcb726

    • SHA256

      41bf45ad0995683fe4cec9113ed17cc33f3c5ad9416a9cc53f1fda5e93d1bd79

    • SHA512

      07808bca038d4f03739fe61f3e130cb49c02f6b075dec795852084d50bd2fdee19565c71009f2dee8c72ddf85c0b332e1ca3b3e6934430fd6e87eb720fbb4738

    • SSDEEP

      393216:4sCeNo3ywhCYNGFhBbCJm+DXsB6tDkz1Pp/:j/E3hD8LBF+jxtYj/

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks