General

  • Target

    112.apk

  • Size

    3.7MB

  • Sample

    240517-q61ecaah6z

  • MD5

    24ee056adb3b47fda73acc5e71a39a70

  • SHA1

    44ba23f154f9f9e1b6113fe778859da614fcff98

  • SHA256

    36ec747cc065204a7bd20c92249293589147c60ab02172d567cce64a4bdd0bf0

  • SHA512

    9ba2c12f4466045cb5d2227caec1c99bde02ddf7e40f0774757ce1f5068c515d6dbee73c347edffb6964688494b37b9f37dad79f28ae5d4e5c19a0b59800ac7f

  • SSDEEP

    98304:zI3Nsw/r7wzPR+xiPQXQMhykYYPmoo/KrOyaS:E3NV8N+XX/y6PmIaS

Malware Config

Targets

    • Target

      112.apk

    • Size

      3.7MB

    • MD5

      24ee056adb3b47fda73acc5e71a39a70

    • SHA1

      44ba23f154f9f9e1b6113fe778859da614fcff98

    • SHA256

      36ec747cc065204a7bd20c92249293589147c60ab02172d567cce64a4bdd0bf0

    • SHA512

      9ba2c12f4466045cb5d2227caec1c99bde02ddf7e40f0774757ce1f5068c515d6dbee73c347edffb6964688494b37b9f37dad79f28ae5d4e5c19a0b59800ac7f

    • SSDEEP

      98304:zI3Nsw/r7wzPR+xiPQXQMhykYYPmoo/KrOyaS:E3NV8N+XX/y6PmIaS

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks