General

  • Target

    Dooneh.apk

  • Size

    13.5MB

  • Sample

    240522-nt141ade51

  • MD5

    36c300197182e64d87440159098f71ce

  • SHA1

    9f5cc990ff32291c76824e3f5fb44cca60164ae4

  • SHA256

    44388e1ea127dca2b4400fda9f5a30e17dc4862ff142c7492f0bb9b7f793215e

  • SHA512

    b3498d50cd098fb4c15364803c155853f58512a08615d26bc3cafbcc31a4ae808999bff2351dea76e95270ed4f9de936dea34bea6e53de00fe2f0d056ead6d9f

  • SSDEEP

    393216:cEJdST96fM8Mcd0Z970eW2vkSGhu1YXOK3InCl1TPQpDgiKrk:bJUTEfL6ZN0ZSwBXh3IKRsEQ

Malware Config

Targets

    • Target

      Dooneh.apk

    • Size

      13.5MB

    • MD5

      36c300197182e64d87440159098f71ce

    • SHA1

      9f5cc990ff32291c76824e3f5fb44cca60164ae4

    • SHA256

      44388e1ea127dca2b4400fda9f5a30e17dc4862ff142c7492f0bb9b7f793215e

    • SHA512

      b3498d50cd098fb4c15364803c155853f58512a08615d26bc3cafbcc31a4ae808999bff2351dea76e95270ed4f9de936dea34bea6e53de00fe2f0d056ead6d9f

    • SSDEEP

      393216:cEJdST96fM8Mcd0Z970eW2vkSGhu1YXOK3InCl1TPQpDgiKrk:bJUTEfL6ZN0ZSwBXh3IKRsEQ

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks