General

  • Target

    Aibi Photo AI Photo Enhancer_1.53.0.apk

  • Size

    96.5MB

  • Sample

    240522-dyfzhsae96

  • MD5

    746cc2f2ae5d524df0c052c61c3f1c49

  • SHA1

    f18069905c3774902e9a3b22c00684dcac8ffa3e

  • SHA256

    24ffd21df0d0bdcc6c77ff3a77e20c16772dd6a3648eabb963ce3aa1edd73c6d

  • SHA512

    1b96e972210c08ffb22331d4c48691f64b93254adc9962883f20a3aebacd5492cd02764441d4417934793d20f26bc976e1ea17ae9430eb9d23340eed83b18884

  • SSDEEP

    1572864:0QMrUkM2ZDb/46b8oj9SMk8ElO4SQnD1k+dcAalIFQkdbL1:7MrU9WJ8osMESQnR9Palufph

Malware Config

Targets

    • Target

      Aibi Photo AI Photo Enhancer_1.53.0.apk

    • Size

      96.5MB

    • MD5

      746cc2f2ae5d524df0c052c61c3f1c49

    • SHA1

      f18069905c3774902e9a3b22c00684dcac8ffa3e

    • SHA256

      24ffd21df0d0bdcc6c77ff3a77e20c16772dd6a3648eabb963ce3aa1edd73c6d

    • SHA512

      1b96e972210c08ffb22331d4c48691f64b93254adc9962883f20a3aebacd5492cd02764441d4417934793d20f26bc976e1ea17ae9430eb9d23340eed83b18884

    • SSDEEP

      1572864:0QMrUkM2ZDb/46b8oj9SMk8ElO4SQnD1k+dcAalIFQkdbL1:7MrU9WJ8osMESQnR9Palufph

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Reads the content of photos stored on the user's device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks