General
-
Target
honeygain_app.apk
-
Size
7.8MB
-
Sample
240426-trgv8sgc2s
-
MD5
b938576de812d5495878e2bd66ec98ff
-
SHA1
9eeafc8e85f1cd7e76c20eeb0590a222ac490115
-
SHA256
e19d58b9c7b48b85118a79795ddd5515b10ccd8be5cef881b5bc806e4af0fe3f
-
SHA512
ef0519dac250c8bb760fda151e82d6f85f5332a342f46d716682194fc0374605604e3b636d873970bb94c94e243e9f31c612854c250a02485d10cb50f90f0978
-
SSDEEP
196608:RtkNPy5ehTjK4iIZbvSxNhFQsOidkMFE3nT8cnk:iyNFIZGxN9tck
Static task
static1
Behavioral task
behavioral1
Sample
honeygain_app.apk
Resource
android-33-x64-arm64-20240229-en
Malware Config
Targets
-
-
Target
honeygain_app.apk
-
Size
7.8MB
-
MD5
b938576de812d5495878e2bd66ec98ff
-
SHA1
9eeafc8e85f1cd7e76c20eeb0590a222ac490115
-
SHA256
e19d58b9c7b48b85118a79795ddd5515b10ccd8be5cef881b5bc806e4af0fe3f
-
SHA512
ef0519dac250c8bb760fda151e82d6f85f5332a342f46d716682194fc0374605604e3b636d873970bb94c94e243e9f31c612854c250a02485d10cb50f90f0978
-
SSDEEP
196608:RtkNPy5ehTjK4iIZbvSxNhFQsOidkMFE3nT8cnk:iyNFIZGxN9tck
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2User Evasion
2Virtualization/Sandbox Evasion
2System Checks
2