Resubmissions

07/05/2024, 18:23

240507-w1lxnahe7s 10

07/05/2024, 18:12

240507-ws828ahc2s 10

General

  • Target

    karma.apk

  • Size

    2.2MB

  • Sample

    240507-w1lxnahe7s

  • MD5

    179c8fee6aefefde45f4b574a5087ec1

  • SHA1

    6f29cff8df8bd3f1778db96b1098acd90e97eb11

  • SHA256

    352389a788f0dba067feba582e329c75c4c811511eb96e4b1e8a45fa27aefb04

  • SHA512

    6bf617a6c1cb0705e07fda97f719103c5cb542963009bb14e0df7745e46fe6a7c661f66bdb4ad34798b9ad0673a5b2dc1fcee68c95f3c72f4ccde47739c70a30

  • SSDEEP

    49152:AgvYgTQuGaW/d3VVQfDd55E8HJT1tDPhlg+giKl3fjP01Mt:KHuGxdMfDd55E8HJ3DplErcCt

Malware Config

Extracted

Family

androrat

C2

3.142.129.56:17365

Targets

    • Target

      karma.apk

    • Size

      2.2MB

    • MD5

      179c8fee6aefefde45f4b574a5087ec1

    • SHA1

      6f29cff8df8bd3f1778db96b1098acd90e97eb11

    • SHA256

      352389a788f0dba067feba582e329c75c4c811511eb96e4b1e8a45fa27aefb04

    • SHA512

      6bf617a6c1cb0705e07fda97f719103c5cb542963009bb14e0df7745e46fe6a7c661f66bdb4ad34798b9ad0673a5b2dc1fcee68c95f3c72f4ccde47739c70a30

    • SSDEEP

      49152:AgvYgTQuGaW/d3VVQfDd55E8HJT1tDPhlg+giKl3fjP01Mt:KHuGxdMfDd55E8HJ3DplErcCt

    • Removes its main activity from the application launcher

    • Reads the content of the call log.

    • Checks if the internet connection is available

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks