General

  • Target

    Duolingo-Premium-v5.151.6_build_1867-Mod.apk

  • Size

    59.5MB

  • Sample

    240522-1d2rtahf69

  • MD5

    62ab9af731f35177b5632054d10eb870

  • SHA1

    490d5897c47e80b1dd737d849481db6b17091b44

  • SHA256

    5444d3a9559c2d76d8b1e6e058f671f9b9a091cc9e2c45af4ddf751e5d2b84ba

  • SHA512

    72ff817912f110d572c403de1db25f7e6b848165de1d2ceddb93a99100c5d89ad826e1c7037220158aa8d61454a690158ecf04bc4d5f44099eead183f44e9779

  • SSDEEP

    1572864:OMxHpk0B+2shdLMD27aKvphWqjFueq1IijlkxjgD1+iVKx2xG+1laC:OO2GsMC7aKvrWmFvmrv

Malware Config

Targets

    • Target

      Duolingo-Premium-v5.151.6_build_1867-Mod.apk

    • Size

      59.5MB

    • MD5

      62ab9af731f35177b5632054d10eb870

    • SHA1

      490d5897c47e80b1dd737d849481db6b17091b44

    • SHA256

      5444d3a9559c2d76d8b1e6e058f671f9b9a091cc9e2c45af4ddf751e5d2b84ba

    • SHA512

      72ff817912f110d572c403de1db25f7e6b848165de1d2ceddb93a99100c5d89ad826e1c7037220158aa8d61454a690158ecf04bc4d5f44099eead183f44e9779

    • SSDEEP

      1572864:OMxHpk0B+2shdLMD27aKvphWqjFueq1IijlkxjgD1+iVKx2xG+1laC:OO2GsMC7aKvrWmFvmrv

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks