General

  • Target

    uptodown-com.supercell.squad.apk

  • Size

    7.2MB

  • Sample

    240425-hkvmzagf6w

  • MD5

    468e9e6b5278a19d5ae0a3035752a9ba

  • SHA1

    ed9da2a55918e40f67a5f8c0650916499f0241df

  • SHA256

    68abce14e88f35831e916153dfe88a307c2adc65298c87a7f9bafbaecbe87e03

  • SHA512

    6ac39cdedf420b2e36f816082fe2215f68e9312a08e3698a0c73fedffcbc38ae359a1a90abc95d37d5dad81785d13d6a2c3a1d088308bcabe78610e47db434dc

  • SSDEEP

    98304:DmAMb7Zb4ywF6PmOUcIgax7O56rzaPiT46wvD9337EU:DmAMPX66PTUgt56ISn2DpEU

Malware Config

Targets

    • Target

      uptodown-com.supercell.squad.apk

    • Size

      7.2MB

    • MD5

      468e9e6b5278a19d5ae0a3035752a9ba

    • SHA1

      ed9da2a55918e40f67a5f8c0650916499f0241df

    • SHA256

      68abce14e88f35831e916153dfe88a307c2adc65298c87a7f9bafbaecbe87e03

    • SHA512

      6ac39cdedf420b2e36f816082fe2215f68e9312a08e3698a0c73fedffcbc38ae359a1a90abc95d37d5dad81785d13d6a2c3a1d088308bcabe78610e47db434dc

    • SSDEEP

      98304:DmAMb7Zb4ywF6PmOUcIgax7O56rzaPiT46wvD9337EU:DmAMPX66PTUgt56ISn2DpEU

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks