General

  • Target

    getApp25042.apk

  • Size

    9.3MB

  • Sample

    240510-w72lpabc8s

  • MD5

    b65a4a9803aa3a6d94401365be51a704

  • SHA1

    b4475f15dfe5980e17d2125600c01d0be0c0bd31

  • SHA256

    5ad322f32eead60d4318d762b125af07f129c3fc021f9d04c6c830ddd1a80f8f

  • SHA512

    260aea3c2f0d29fa021e28b268f3122a7cfdba07fdd7efe221872e9b2a9fa2ff5410531251bca379c6e7094f9798e6795621a0ec85135047b5fa7ff3190d8890

  • SSDEEP

    196608:P+eKnwX4tveiXP76hCKxqPgp72IpIae58b4ddZJZF7hAWeyf9y9dPzSCAms3K:P+8INethCBPgJ2+e52OZJBAhy1wJ

Malware Config

Targets

    • Target

      getApp25042.apk

    • Size

      9.3MB

    • MD5

      b65a4a9803aa3a6d94401365be51a704

    • SHA1

      b4475f15dfe5980e17d2125600c01d0be0c0bd31

    • SHA256

      5ad322f32eead60d4318d762b125af07f129c3fc021f9d04c6c830ddd1a80f8f

    • SHA512

      260aea3c2f0d29fa021e28b268f3122a7cfdba07fdd7efe221872e9b2a9fa2ff5410531251bca379c6e7094f9798e6795621a0ec85135047b5fa7ff3190d8890

    • SSDEEP

      196608:P+eKnwX4tveiXP76hCKxqPgp72IpIae58b4ddZJZF7hAWeyf9y9dPzSCAms3K:P+8INethCBPgJ2+e52OZJBAhy1wJ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks