General

  • Target

    Epix play 2.6.2.apk

  • Size

    61.7MB

  • Sample

    240424-xmbefafd4z

  • MD5

    77e0545739d04026560777dcfca2557b

  • SHA1

    284275fffdaf3872dfabb3a4a171eb9c7733c24e

  • SHA256

    ca87b8240a9ef83a129df7c27730995379da8b88f5ae71543ed3e8e28db043f0

  • SHA512

    7fb3b0e60768b595a4581691ac4d2fff6a0b0229ed715e5e2dc94c48f26fba0107522d3fefd2f06a0becc474f8a138600479a744b40d8c07cdd5677fce9c9c4c

  • SSDEEP

    1572864:kvrxDnPRPZNvQdRkU8HFv9xrGab+TYc3fqd5:kvJW3k1HzsaGNvqv

Malware Config

Targets

    • Target

      Epix play 2.6.2.apk

    • Size

      61.7MB

    • MD5

      77e0545739d04026560777dcfca2557b

    • SHA1

      284275fffdaf3872dfabb3a4a171eb9c7733c24e

    • SHA256

      ca87b8240a9ef83a129df7c27730995379da8b88f5ae71543ed3e8e28db043f0

    • SHA512

      7fb3b0e60768b595a4581691ac4d2fff6a0b0229ed715e5e2dc94c48f26fba0107522d3fefd2f06a0becc474f8a138600479a744b40d8c07cdd5677fce9c9c4c

    • SSDEEP

      1572864:kvrxDnPRPZNvQdRkU8HFv9xrGab+TYc3fqd5:kvJW3k1HzsaGNvqv

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Requests dangerous framework permissions

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks