General

  • Target

    File_v2_86_Zippyshare.apk

  • Size

    14.2MB

  • Sample

    240426-rdqvwadb88

  • MD5

    8cad325b03eada1d4a189f1153605a53

  • SHA1

    c5ca6b6854f2f89aa4b270ab2a97a31337225c8e

  • SHA256

    4715336465428fb547799b21ab6cb5d355a12c522acad283e3bfe5607666c440

  • SHA512

    90a7979fa863a13217ac9f8dafcac6994c74f81695d78059c7cb26ea67dfdc4fe44f6450512ac14cafcbd3cb1df30a4e184138af16cd4b330eb17226b1948d1f

  • SSDEEP

    393216:3vyFXx38+xLNuxfjGKeawX5+Yn66nnJKs:K9J8yN6Kkg5tJL

Malware Config

Targets

    • Target

      File_v2_86_Zippyshare.apk

    • Size

      14.2MB

    • MD5

      8cad325b03eada1d4a189f1153605a53

    • SHA1

      c5ca6b6854f2f89aa4b270ab2a97a31337225c8e

    • SHA256

      4715336465428fb547799b21ab6cb5d355a12c522acad283e3bfe5607666c440

    • SHA512

      90a7979fa863a13217ac9f8dafcac6994c74f81695d78059c7cb26ea67dfdc4fe44f6450512ac14cafcbd3cb1df30a4e184138af16cd4b330eb17226b1948d1f

    • SSDEEP

      393216:3vyFXx38+xLNuxfjGKeawX5+Yn66nnJKs:K9J8yN6Kkg5tJL

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks Android system properties for emulator presence.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks