General

  • Target

    75e98ac7cb4104e647f33462c5ece917.bin

  • Size

    3.6MB

  • Sample

    240422-byxadsdh9y

  • MD5

    034861a6c8b790cd26ae10858f51ab99

  • SHA1

    675736aebbbb39fcac52930feade7a96f85f71a9

  • SHA256

    7b56b22cd8af1a1b7763d1520242fc53eb09c67aaa092e0e8891fdc8c1f6ccae

  • SHA512

    018340b8019233eeb2ea53e7031802e6dec5d451343dc488906bfc0969415095efcf5637c3fd4db6b7067270ae49aa4455a796f31e20278f525a2f9c885d7289

  • SSDEEP

    49152:d3nFqRqBKbYgVxyVwKw8/uB2eFM245GvcYD9RxGZeFeo3+4+I2vlKnRrhf3kVh1j:dX0RqUbHxyVG8gM2mQDh4eFdd29mE16k

Malware Config

Targets

    • Target

      def264293c2a15a5e1f0da02f5167ded0db3eb339c3db1e7bd698489d60eb2f3.apk

    • Size

      4.4MB

    • MD5

      75e98ac7cb4104e647f33462c5ece917

    • SHA1

      a1207e642277ed29672abf45cd6a038661c3c7ed

    • SHA256

      def264293c2a15a5e1f0da02f5167ded0db3eb339c3db1e7bd698489d60eb2f3

    • SHA512

      cc8cb11c4b9dae5e726c4d4b1c1786cd61c87776b16931ae65f1cbe564989af051787af267725b9bda3918afa877db0797c01fea12fae00360a50b5479e54ef7

    • SSDEEP

      98304:TrOAylSsqBxPMsUDyskAs24RiJomz0zBkTd0tYlqyC:nasZLUWHAsJwJXzbSCw

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

MITRE ATT&CK Matrix

Tasks