General

  • Target

    Telegram.apk

  • Size

    72.7MB

  • Sample

    240522-2fa8babe25

  • MD5

    3c1c87ec69fe57ae2aca6b24a1c819f8

  • SHA1

    f4c7d1161a6fc09448bf56bb7cf27c3c11d4497d

  • SHA256

    17a0d8c197feaa1dfa63d89713d30a3a02f879f39a35095343ad085be48e6b49

  • SHA512

    c4ce9246fd1b62ada412b12fc03381470d6e2718dac79ce6202859ffe7e262c6b10059bd3a06330115c7ad9e476da29c68ae607b1f8e93f24b94dca271d15080

  • SSDEEP

    1572864:AsI8T/iWuT4CK0EzbUqq+L0h7GldnkWd5fHYZWsKg6U40oq0wXQr25k:1bT/iBcf0Ezbzq+072SgJp6Loqt025k

Malware Config

Targets

    • Target

      Telegram.apk

    • Size

      72.7MB

    • MD5

      3c1c87ec69fe57ae2aca6b24a1c819f8

    • SHA1

      f4c7d1161a6fc09448bf56bb7cf27c3c11d4497d

    • SHA256

      17a0d8c197feaa1dfa63d89713d30a3a02f879f39a35095343ad085be48e6b49

    • SHA512

      c4ce9246fd1b62ada412b12fc03381470d6e2718dac79ce6202859ffe7e262c6b10059bd3a06330115c7ad9e476da29c68ae607b1f8e93f24b94dca271d15080

    • SSDEEP

      1572864:AsI8T/iWuT4CK0EzbUqq+L0h7GldnkWd5fHYZWsKg6U40oq0wXQr25k:1bT/iBcf0Ezbzq+072SgJp6Loqt025k

    • BadBazaar

      BadBazaar is an Android spyware used by GREF APT group.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of photos stored on the user's device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks