General
-
Target
74c96a71cd95e6fab924deb1ddb0a498.bin
-
Size
1.2MB
-
Sample
240503-bqmqzsde89
-
MD5
50059af887f2f96f256af9a882645dee
-
SHA1
4b08656560cefd680b44a91fedefe86d021f1a04
-
SHA256
8a91726e39e1d990e5d4d9368cb66afced71f5b078ebac71149ed1943d631327
-
SHA512
a6a5081b3f152dc9339cd5065daf7c38fa3b3f1a0b3329c7feb77e9c7449b2dfb1516ad6da2beeea0aebf26b95503b260e714d6b3c3776bb520ca9b9998fc3a0
-
SSDEEP
24576:7MPh162DMJEYGUbYTO9TCuade0QRX6PTMs+KeiBJEA/Mk:7EQ2AvGpO9TCuadCX8T3L5
Behavioral task
behavioral1
Sample
d2b5dd74b5950953028cabf5d62c40366b14a2e803fb091500c6b6826f03f95e.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
d2b5dd74b5950953028cabf5d62c40366b14a2e803fb091500c6b6826f03f95e.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
d2b5dd74b5950953028cabf5d62c40366b14a2e803fb091500c6b6826f03f95e.zip
-
Size
1.4MB
-
MD5
74c96a71cd95e6fab924deb1ddb0a498
-
SHA1
7420f8e52a6f890531cbe3e3c4adf2c15e9e423b
-
SHA256
d2b5dd74b5950953028cabf5d62c40366b14a2e803fb091500c6b6826f03f95e
-
SHA512
288ffaa98b853942847367a7ec4f48863d14aa4355234be9b45791a69c88e83f3248a725c0243637cb2a8b1dc62f14346a6b807a5218325a35e8598a6f0287be
-
SSDEEP
24576:Bc1LRTK8hDfBWjuWgMJbJ1VVmw63d+KGZtWSF9ymB7R8uQzgpjbM/4zgdS:BKNzhj4jjg87VVmw6NpGZoSF9nxnQzgF
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1