General

  • Target

    e8a21dfdcaaa2e06a29c07fdfae31c8c57b4d7104f24e9f07c2fa44b750d1fb1.bin

  • Size

    975KB

  • Sample

    240423-1xjekscd26

  • MD5

    d62c4c00976a12f568b5ee1346ddde9c

  • SHA1

    01b9eb1a2ece212553e1bf12d7c06988858317c3

  • SHA256

    e8a21dfdcaaa2e06a29c07fdfae31c8c57b4d7104f24e9f07c2fa44b750d1fb1

  • SHA512

    3dbf58f6608f56744cff074ea32cbfa1e68096cdb6ede7e4df572a76da448a49dc4c302323e2b6786f5e0dbc175401c5cc8f08c012569ed97a7de51594a20803

  • SSDEEP

    12288:2G61LtYY30M2upYS34vEs++0U4k1hlfDsKQ8HCbkmI19fIdszF/YjPTkhUMBmiei:2d1LtYc0M2uMMs+yDxbX+ce+lqPLhlc

Malware Config

Targets

    • Target

      e8a21dfdcaaa2e06a29c07fdfae31c8c57b4d7104f24e9f07c2fa44b750d1fb1.bin

    • Size

      975KB

    • MD5

      d62c4c00976a12f568b5ee1346ddde9c

    • SHA1

      01b9eb1a2ece212553e1bf12d7c06988858317c3

    • SHA256

      e8a21dfdcaaa2e06a29c07fdfae31c8c57b4d7104f24e9f07c2fa44b750d1fb1

    • SHA512

      3dbf58f6608f56744cff074ea32cbfa1e68096cdb6ede7e4df572a76da448a49dc4c302323e2b6786f5e0dbc175401c5cc8f08c012569ed97a7de51594a20803

    • SSDEEP

      12288:2G61LtYY30M2upYS34vEs++0U4k1hlfDsKQ8HCbkmI19fIdszF/YjPTkhUMBmiei:2d1LtYc0M2uMMs+yDxbX+ce+lqPLhlc

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Tries to add a device administrator.

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks