General

  • Target

    WhatsApp_Gold_V31.apk

  • Size

    79.1MB

  • Sample

    240425-lg3qyshd81

  • MD5

    56ef68dd643124720ac57d9b7b15f4ed

  • SHA1

    61775bc63e039e1a09f2f1958b4ee21be45c80fa

  • SHA256

    ff9acd844ef86684dce8238990dc25bdd16197b6324557bd66f7fa6d2d546ce3

  • SHA512

    c400753147e5a7a2c0285d7b6aa70f7563d712c663a9574c0091b681a46439e2328f8aa0793ec758209dee70635271b2c13b42e9355e19e585607ec44c37ed51

  • SSDEEP

    1572864:0C9nz1W3ns15whM1c4s40MmDyPwpJg+LKrGb/gzaMsnleP+0f4:0Gz1A85MMV0rDu0b/aahg14

Malware Config

Targets

    • Target

      WhatsApp_Gold_V31.apk

    • Size

      79.1MB

    • MD5

      56ef68dd643124720ac57d9b7b15f4ed

    • SHA1

      61775bc63e039e1a09f2f1958b4ee21be45c80fa

    • SHA256

      ff9acd844ef86684dce8238990dc25bdd16197b6324557bd66f7fa6d2d546ce3

    • SHA512

      c400753147e5a7a2c0285d7b6aa70f7563d712c663a9574c0091b681a46439e2328f8aa0793ec758209dee70635271b2c13b42e9355e19e585607ec44c37ed51

    • SSDEEP

      1572864:0C9nz1W3ns15whM1c4s40MmDyPwpJg+LKrGb/gzaMsnleP+0f4:0Gz1A85MMV0rDu0b/aahg14

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks