General

  • Target

    8c17ec104df39656f95430fc62ae650a911cb6cfcdb8b8f24fa4f149c4ce0d36.apk

  • Size

    22.4MB

  • Sample

    240425-stz9xsbh9y

  • MD5

    af430ecd756db9bb2bbf47a6b98cdab9

  • SHA1

    542ef9700457e7cb19a9910557462740e1174f11

  • SHA256

    8c17ec104df39656f95430fc62ae650a911cb6cfcdb8b8f24fa4f149c4ce0d36

  • SHA512

    4485d1f1788ff35272ea1014524232aaacbde030915adc18f5a42417d83d16a611f02bbb893268e0ce423656f15f6bd162309ae005ab16591d1378e75e71dec9

  • SSDEEP

    393216:LapOA21NdpazPnK/VQd0WvMBJYCV1GZwwlWa7P1MJEzvA/0rnyH6KtHbONXLiHPv:Lap81R8vK/VQd0dJT+v7P1MJEDBrny4S

Malware Config

Targets

    • Target

      8c17ec104df39656f95430fc62ae650a911cb6cfcdb8b8f24fa4f149c4ce0d36.apk

    • Size

      22.4MB

    • MD5

      af430ecd756db9bb2bbf47a6b98cdab9

    • SHA1

      542ef9700457e7cb19a9910557462740e1174f11

    • SHA256

      8c17ec104df39656f95430fc62ae650a911cb6cfcdb8b8f24fa4f149c4ce0d36

    • SHA512

      4485d1f1788ff35272ea1014524232aaacbde030915adc18f5a42417d83d16a611f02bbb893268e0ce423656f15f6bd162309ae005ab16591d1378e75e71dec9

    • SSDEEP

      393216:LapOA21NdpazPnK/VQd0WvMBJYCV1GZwwlWa7P1MJEzvA/0rnyH6KtHbONXLiHPv:Lap81R8vK/VQd0dJT+v7P1MJEDBrny4S

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks