General

  • Target

    PicsArt-v24.9.3-MOD-picsartmodapk.io.apk

  • Size

    77.2MB

  • Sample

    240518-gq4mdseh35

  • MD5

    96b9cc418eaaab42ca94349b0b675cbc

  • SHA1

    8d41ec75c60e3b20ccb4533cf7d670ad10c983d8

  • SHA256

    da9972da46955699946c66fc469352da51edd1199ed7c034da098eda703705a7

  • SHA512

    a2fcfb9c3b01c4186fd765e4bfc2796d5c968bd4458f10c4adf4bdc7196b40dfb99dd3298c270607a364f220cfb37daeb50ef9aa089170a11dc03dd815598b0d

  • SSDEEP

    1572864:qxXMAz1tfq2/NWW/ZpgjctA4E6Ky3DzluRfm3BpEfzqmuy3MTJyn:qW+1tyMWuR+x6HDzlIfmWq8aE

Malware Config

Targets

    • Target

      PicsArt-v24.9.3-MOD-picsartmodapk.io.apk

    • Size

      77.2MB

    • MD5

      96b9cc418eaaab42ca94349b0b675cbc

    • SHA1

      8d41ec75c60e3b20ccb4533cf7d670ad10c983d8

    • SHA256

      da9972da46955699946c66fc469352da51edd1199ed7c034da098eda703705a7

    • SHA512

      a2fcfb9c3b01c4186fd765e4bfc2796d5c968bd4458f10c4adf4bdc7196b40dfb99dd3298c270607a364f220cfb37daeb50ef9aa089170a11dc03dd815598b0d

    • SSDEEP

      1572864:qxXMAz1tfq2/NWW/ZpgjctA4E6Ky3DzluRfm3BpEfzqmuy3MTJyn:qW+1tyMWuR+x6HDzlIfmWq8aE

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the mobile country code (MCC)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks