General

  • Target

  • Size

    76.3MB

  • Sample

    240516-2jnmtabh7x

  • MD5

    3bcdeb8ac312a4dd066b9e826a9add26

  • SHA1

    e039b5508d6efa3844cd0cf0cb8654d417b1b8f0

  • SHA256

    2e1406979f0d7c8b134eac31bf4e35a1eadbcf7ff3590d7fdf711d6865d95e2d

  • SHA512

    54d1ed593203ad09b7f87179ced51484a73f95b1466764ad4e88317c8fbaadfb0733f0dcaa88b19b57443f8168a3571b3808792bb8b85b5de808c5bb101a3176

  • SSDEEP

    1572864:V1oeeZAOLAjIo0dVZPapJHhbozNCUXhpV8:YcR0dTQJoRnu

Malware Config

Targets

    • Target

    • Size

      76.3MB

    • MD5

      3bcdeb8ac312a4dd066b9e826a9add26

    • SHA1

      e039b5508d6efa3844cd0cf0cb8654d417b1b8f0

    • SHA256

      2e1406979f0d7c8b134eac31bf4e35a1eadbcf7ff3590d7fdf711d6865d95e2d

    • SHA512

      54d1ed593203ad09b7f87179ced51484a73f95b1466764ad4e88317c8fbaadfb0733f0dcaa88b19b57443f8168a3571b3808792bb8b85b5de808c5bb101a3176

    • SSDEEP

      1572864:V1oeeZAOLAjIo0dVZPapJHhbozNCUXhpV8:YcR0dTQJoRnu

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks