General

  • Target

    mgsProMob_P500_V1_debug.apk

  • Size

    38.5MB

  • Sample

    240522-l1sebsbd3s

  • MD5

    903d55966ea7dbb64c07825f7db10125

  • SHA1

    fca36f616edc9e2f58748b2a8408121a2041e53a

  • SHA256

    721fc346f0bcbb374027d049a954ef6901fdaec387ae441263175d49c51c2750

  • SHA512

    83e4d44d880bb561885d77c8f579431ff5c2c5d06152237d9bc6b5a564a63f7ba785c3e61b69e7f226c0cdf23362b610691219c36e7f85aabf84076a1487c3d4

  • SSDEEP

    786432:USjo3Of7Xl4u2/0wjcfm+bRqJtkTkijwkCeMRrYRAEzRXl0jwh+bRqJ8z:UO5z1Z2/0ccDNqJuo67CeMiAEf4zNqJm

Malware Config

Targets

    • Target

      mgsProMob_P500_V1_debug.apk

    • Size

      38.5MB

    • MD5

      903d55966ea7dbb64c07825f7db10125

    • SHA1

      fca36f616edc9e2f58748b2a8408121a2041e53a

    • SHA256

      721fc346f0bcbb374027d049a954ef6901fdaec387ae441263175d49c51c2750

    • SHA512

      83e4d44d880bb561885d77c8f579431ff5c2c5d06152237d9bc6b5a564a63f7ba785c3e61b69e7f226c0cdf23362b610691219c36e7f85aabf84076a1487c3d4

    • SSDEEP

      786432:USjo3Of7Xl4u2/0wjcfm+bRqJtkTkijwkCeMRrYRAEzRXl0jwh+bRqJ8z:UO5z1Z2/0ccDNqJuo67CeMiAEf4zNqJm

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks