General

  • Target

    app-release.apk

  • Size

    69.5MB

  • Sample

    240424-z2pxgshf71

  • MD5

    6392927515ca5aa30f380b813d73b14f

  • SHA1

    0f5f722e231b8d07a83595109e8908be64caabe3

  • SHA256

    f056afa9e7ac9c0f44653088b36461cc3f4b9a5b35960c03a9a807efd70f31b0

  • SHA512

    3a0a4000c5c3f80553267c09e4b8b4394021a4eba6843f80464f2dc6fcc5a4ab0aa90aa88286134b9ffe2249d7bdec263cf1918de706c1cfe3e39d9a87951be6

  • SSDEEP

    1572864:DbmJ7/xSsZ6T/drcunyToBXXeEBpYu8EqFT4NeXlArO:XGJSsZ6T/drcunyToB+EBpYu8EqFT4Gf

Malware Config

Targets

    • Target

      app-release.apk

    • Size

      69.5MB

    • MD5

      6392927515ca5aa30f380b813d73b14f

    • SHA1

      0f5f722e231b8d07a83595109e8908be64caabe3

    • SHA256

      f056afa9e7ac9c0f44653088b36461cc3f4b9a5b35960c03a9a807efd70f31b0

    • SHA512

      3a0a4000c5c3f80553267c09e4b8b4394021a4eba6843f80464f2dc6fcc5a4ab0aa90aa88286134b9ffe2249d7bdec263cf1918de706c1cfe3e39d9a87951be6

    • SSDEEP

      1572864:DbmJ7/xSsZ6T/drcunyToBXXeEBpYu8EqFT4NeXlArO:XGJSsZ6T/drcunyToB+EBpYu8EqFT4Gf

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks