General

  • Target

    dangbeimarket_4.4.2_294_znds.apk

  • Size

    10.4MB

  • Sample

    240522-n7fp8agb7y

  • MD5

    145ccbac0d7bd4cf33c1a279aab97b64

  • SHA1

    11d4e8b2418b68fd8b61c088fab8e0e4d29f9e1a

  • SHA256

    dec827a2870293badfd44a3fc1baba3f62f291690ca22c5c8991782b577bcaaf

  • SHA512

    4a896be76f1ea2783124db6a06dbec0297a9be9b2a7748dc6a05417b2a86e4b3ca9ddb2daecc0c0579ffb66f08f65ea2b0ecf89a7fcf98e91fd8a479644f49b7

  • SSDEEP

    196608:ok+NBLnf8QDjTtaMRnwPZYxusUfge7VJ8sRmKDSR5yGGfcew:ok+7EQYM1zx9+7b/R/DSrycew

Malware Config

Targets

    • Target

      dangbeimarket_4.4.2_294_znds.apk

    • Size

      10.4MB

    • MD5

      145ccbac0d7bd4cf33c1a279aab97b64

    • SHA1

      11d4e8b2418b68fd8b61c088fab8e0e4d29f9e1a

    • SHA256

      dec827a2870293badfd44a3fc1baba3f62f291690ca22c5c8991782b577bcaaf

    • SHA512

      4a896be76f1ea2783124db6a06dbec0297a9be9b2a7748dc6a05417b2a86e4b3ca9ddb2daecc0c0579ffb66f08f65ea2b0ecf89a7fcf98e91fd8a479644f49b7

    • SSDEEP

      196608:ok+NBLnf8QDjTtaMRnwPZYxusUfge7VJ8sRmKDSR5yGGfcew:ok+7EQYM1zx9+7b/R/DSrycew

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks