General

  • Target

    girls-x-battle-1-579-0.apk

  • Size

    140.7MB

  • Sample

    240427-f86c9scc24

  • MD5

    0aa06379096bc415c10329b6e690f0cb

  • SHA1

    265dd52d424a34ecb9be278de3ef29eba5f9bce0

  • SHA256

    c27e708a80b7f903918aff6e1c184971f3ef70b372cdba05bdaa3abf30a1d8a7

  • SHA512

    3d87da4f6145b0cfcdaf72f656c2c09bcd1700b2a35bebc30b967122b120de0a537b5786e0902c48c82596b5718066aef9235e0a73a642a9df38d0bc13a9d5a7

  • SSDEEP

    3145728:2PqpjBBwa7p/dAO7/XBFfPhp/GZrmwoihJIkHz0sII:2C5Pp6A/7PhumwPJp8I

Malware Config

Targets

    • Target

      girls-x-battle-1-579-0.apk

    • Size

      140.7MB

    • MD5

      0aa06379096bc415c10329b6e690f0cb

    • SHA1

      265dd52d424a34ecb9be278de3ef29eba5f9bce0

    • SHA256

      c27e708a80b7f903918aff6e1c184971f3ef70b372cdba05bdaa3abf30a1d8a7

    • SHA512

      3d87da4f6145b0cfcdaf72f656c2c09bcd1700b2a35bebc30b967122b120de0a537b5786e0902c48c82596b5718066aef9235e0a73a642a9df38d0bc13a9d5a7

    • SSDEEP

      3145728:2PqpjBBwa7p/dAO7/XBFfPhp/GZrmwoihJIkHz0sII:2C5Pp6A/7PhumwPJp8I

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks