General

  • Target

    8e38d78d6cd0c2506406f8c0faed724a7d8e27db3ce77fec3f3b864be42ea043.bin

  • Size

    617KB

  • Sample

    240423-1xl6gacd27

  • MD5

    6f3b93caf9f42c77122efdc86719e935

  • SHA1

    e797c6dc3550f146d260cff15655d39646e162de

  • SHA256

    8e38d78d6cd0c2506406f8c0faed724a7d8e27db3ce77fec3f3b864be42ea043

  • SHA512

    ad4f636f87d0118495dc10a004d3a3898ceb3296a6437f6ebf5b5bbfd6f7cf71a24b78ff6b708827d334e6beb4a8ebd7a6603b9e83e09c1305110c4ef45b64fd

  • SSDEEP

    12288:VVBED9V8HxbQRZO/poJukhQJBv/S8t8K6xoq5rSI9M+PEDkhDZj3aRi:VVBEDn8HxERo/WJuEEx4KARrSIpPEDKv

Malware Config

Targets

    • Target

      8e38d78d6cd0c2506406f8c0faed724a7d8e27db3ce77fec3f3b864be42ea043.bin

    • Size

      617KB

    • MD5

      6f3b93caf9f42c77122efdc86719e935

    • SHA1

      e797c6dc3550f146d260cff15655d39646e162de

    • SHA256

      8e38d78d6cd0c2506406f8c0faed724a7d8e27db3ce77fec3f3b864be42ea043

    • SHA512

      ad4f636f87d0118495dc10a004d3a3898ceb3296a6437f6ebf5b5bbfd6f7cf71a24b78ff6b708827d334e6beb4a8ebd7a6603b9e83e09c1305110c4ef45b64fd

    • SSDEEP

      12288:VVBED9V8HxbQRZO/poJukhQJBv/S8t8K6xoq5rSI9M+PEDkhDZj3aRi:VVBEDn8HxERo/WJuEEx4KARrSIpPEDKv

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Tries to add a device administrator.

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks