General

  • Target

    AptoideTV-5.1.2.apk

  • Size

    11.4MB

  • Sample

    240522-n6bd4sfh8z

  • MD5

    48fb019529cdd750d20693710da30fbc

  • SHA1

    6d7912125707fc9c57dd1f074dedb1a039c4386e

  • SHA256

    0313c70bc17a7edcf0fea38105a5434ad4d195f8c04f7c67f2d67b0d92e1f0aa

  • SHA512

    10d93ae8d6f726da8376e23abddd334e56426ae751be7400300c9f50063ed9f26190a19aad99e17bd7393e857e808ea605e5e719f8e6b76148d37b0cc89911c4

  • SSDEEP

    196608:hKeu5WgVAZWl1vqHhJwKL1XqVDk+FAVtf5VzwD5GzF3usY9Nq9g:hKeVW11YjL0fGVpzcGF3usk4g

Malware Config

Targets

    • Target

      AptoideTV-5.1.2.apk

    • Size

      11.4MB

    • MD5

      48fb019529cdd750d20693710da30fbc

    • SHA1

      6d7912125707fc9c57dd1f074dedb1a039c4386e

    • SHA256

      0313c70bc17a7edcf0fea38105a5434ad4d195f8c04f7c67f2d67b0d92e1f0aa

    • SHA512

      10d93ae8d6f726da8376e23abddd334e56426ae751be7400300c9f50063ed9f26190a19aad99e17bd7393e857e808ea605e5e719f8e6b76148d37b0cc89911c4

    • SSDEEP

      196608:hKeu5WgVAZWl1vqHhJwKL1XqVDk+FAVtf5VzwD5GzF3usY9Nq9g:hKeVW11YjL0fGVpzcGF3usk4g

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks