General

  • Target

    d59a4848b584fdd93eb3d0b554a8df58.bin

  • Size

    1.2MB

  • Sample

    240503-b8bfnsca8s

  • MD5

    b8ea0bbaaf9ea094c3963cbab3cdd2e7

  • SHA1

    910ca707077c9b73a92e1d508c9415e5b71fbf38

  • SHA256

    8d771b6c61479c87bcdb257351f7a9290bc4adf2f3d20a047fc256c149e931a2

  • SHA512

    a520fc33afce149af95d93e31d5b2ef6093a4e5711715a55d2b249f265d6afd95f4611de2105bf1d9a1b2f91c2a70c0b750000e7d259aa4d40614a68d64335c3

  • SSDEEP

    24576:jVH2bAzfiEyUBl3b+C0TFAN0D8YK/Xs8nQ0vsUUTXIgPK9v3y:WUfFyUBlLlYAEU6jS9fy

Malware Config

Targets

    • Target

      32e4dee58ea17addc5df4ffb862ab3a8df1697598cb6437f92de4075665812c2.zip

    • Size

      1.4MB

    • MD5

      d59a4848b584fdd93eb3d0b554a8df58

    • SHA1

      c60756e85bc596c61fdd4caf3fec9a0d995c4274

    • SHA256

      32e4dee58ea17addc5df4ffb862ab3a8df1697598cb6437f92de4075665812c2

    • SHA512

      2c34e5cac3ef7063f5ce145975b6fdd025753005b6352d1f2b83aac9c7cfd15f3e065dffb4aab9c1815626277d8c28ade94e5d7ae8803d7349a9f573fe6a0ee8

    • SSDEEP

      24576:UsMX7QNP9BBPhW70qVZybbQe7mPbDYxNR18jregpfOV/4zgdfw:UjodEIqqXQe7ag/8regpfWzd4

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Prevents application removal

      Application may abuse the framework's APIs to prevent removal.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks