General

  • Target

    705313f75d9048531c21b3d7d123007c

  • Size

    1.4MB

  • Sample

    240517-w2xesacf97

  • MD5

    705313f75d9048531c21b3d7d123007c

  • SHA1

    73aea9a5a11623ee6709beb435f4c289355b1b3b

  • SHA256

    e8605854c8730d2e80d8a5edd8bc83eb7c397a700255754ec9140b9717f7d467

  • SHA512

    f88c90d9681beddaea45d2ad78af47cee0d6f47222e89a9d486d75fb3365c7d1e1f7cc3a7bb74e6877000427e72eacf553c771fef2279a857617fc5480459f24

  • SSDEEP

    24576:ej8HElKXD2sP2fldmkDLKBgLFF0e76xxIDIDyJYgx8F5UP3QXbpLPYc:ej8HElKX6sPuldhbLBmxIDIDgYk8g3uT

Malware Config

Targets

    • Target

      705313f75d9048531c21b3d7d123007c

    • Size

      1.4MB

    • MD5

      705313f75d9048531c21b3d7d123007c

    • SHA1

      73aea9a5a11623ee6709beb435f4c289355b1b3b

    • SHA256

      e8605854c8730d2e80d8a5edd8bc83eb7c397a700255754ec9140b9717f7d467

    • SHA512

      f88c90d9681beddaea45d2ad78af47cee0d6f47222e89a9d486d75fb3365c7d1e1f7cc3a7bb74e6877000427e72eacf553c771fef2279a857617fc5480459f24

    • SSDEEP

      24576:ej8HElKXD2sP2fldmkDLKBgLFF0e76xxIDIDyJYgx8F5UP3QXbpLPYc:ej8HElKX6sPuldhbLBmxIDIDgYk8g3uT

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads the contacts stored on the device.

    • Reads the content of the calendar entry data.

    • Reads the content of the call log.

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks