General

  • Target

    FMWhatsapp 10.0.3.apk

  • Size

    76.1MB

  • Sample

    240508-2rzp2sbg5w

  • MD5

    b6c70f39f0e6020acf17872766c7f868

  • SHA1

    6fe31b7182561df5faa8058ee4d6c063492825a3

  • SHA256

    264c48b8ed13f95f24cf3011bfc75c6a9934b860b797a6448a82b6acb15f0ce5

  • SHA512

    16075c6aa54855158f51a58a50ef05138a9f1a94857980f3be7c8d0e95331466b8d03066c4c6618b3443eaf5dcc175323c00d50923f8b6b45ab643ac27f5c91b

  • SSDEEP

    1572864:V1oI7AOLAjIo0dVZPapJHhbozN7/lq2DfYyJgQhDJc/:YJR0dTQJoRTl/f7SQhC

Malware Config

Targets

    • Target

      FMWhatsapp 10.0.3.apk

    • Size

      76.1MB

    • MD5

      b6c70f39f0e6020acf17872766c7f868

    • SHA1

      6fe31b7182561df5faa8058ee4d6c063492825a3

    • SHA256

      264c48b8ed13f95f24cf3011bfc75c6a9934b860b797a6448a82b6acb15f0ce5

    • SHA512

      16075c6aa54855158f51a58a50ef05138a9f1a94857980f3be7c8d0e95331466b8d03066c4c6618b3443eaf5dcc175323c00d50923f8b6b45ab643ac27f5c91b

    • SSDEEP

      1572864:V1oI7AOLAjIo0dVZPapJHhbozN7/lq2DfYyJgQhDJc/:YJR0dTQJoRTl/f7SQhC

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks