General

  • Target

    049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8

  • Size

    13.7MB

  • Sample

    240416-mbst8shg51

  • MD5

    1ac6ab6dce7b85bcaebaea0b659a4758

  • SHA1

    cab07fb3bb8a625b69bdce725f68d5667aa183b7

  • SHA256

    049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8

  • SHA512

    d99804456a4382d7b6b759cc683c9685613aa4f6b420c33bbc7c3ddf4d0a4ec3d770dd927b9b7acad11373f01a26a98321628ff54e2ca210a386b61765ab652a

  • SSDEEP

    393216:rSTYCaI+XnaDypqp6rJsCrNo39EIY8rQ2L8:rMYLI+XaDysom6E9EakK8

Malware Config

Targets

    • Target

      049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8

    • Size

      13.7MB

    • MD5

      1ac6ab6dce7b85bcaebaea0b659a4758

    • SHA1

      cab07fb3bb8a625b69bdce725f68d5667aa183b7

    • SHA256

      049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8

    • SHA512

      d99804456a4382d7b6b759cc683c9685613aa4f6b420c33bbc7c3ddf4d0a4ec3d770dd927b9b7acad11373f01a26a98321628ff54e2ca210a386b61765ab652a

    • SSDEEP

      393216:rSTYCaI+XnaDypqp6rJsCrNo39EIY8rQ2L8:rMYLI+XaDysom6E9EakK8

    • Checks Android system properties for emulator presence.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks