General

  • Target

    Atual.apk

  • Size

    6.4MB

  • Sample

    240522-nzs1kseg4v

  • MD5

    72a784d2f3ae555ea45365e9205a0b7e

  • SHA1

    14330bb62e46a9d8be1cf2722a892a535ca04751

  • SHA256

    5f71771a1f40c8226775ddd2e58997ea9e658a92a26a9c052dae21f67cdb95d3

  • SHA512

    cd9756b0b5809ae5dc79da0708a2227dafa1ecd71324110d3fcb4ece97b49acff1a146ec5b5e8ad3c72a768f50ccbb8484dbdf9effa10f228215443c1b4bd6f7

  • SSDEEP

    196608:g9pGvF7UGg5CmrnKqJyy9BUzwVTMDgCQvA5JuL5Zzp:g9pGdAx4YKqYyVVIDuA5JuL5Jp

Malware Config

Targets

    • Target

      Atual.apk

    • Size

      6.4MB

    • MD5

      72a784d2f3ae555ea45365e9205a0b7e

    • SHA1

      14330bb62e46a9d8be1cf2722a892a535ca04751

    • SHA256

      5f71771a1f40c8226775ddd2e58997ea9e658a92a26a9c052dae21f67cdb95d3

    • SHA512

      cd9756b0b5809ae5dc79da0708a2227dafa1ecd71324110d3fcb4ece97b49acff1a146ec5b5e8ad3c72a768f50ccbb8484dbdf9effa10f228215443c1b4bd6f7

    • SSDEEP

      196608:g9pGvF7UGg5CmrnKqJyy9BUzwVTMDgCQvA5JuL5Zzp:g9pGdAx4YKqYyVVIDuA5JuL5Jp

    Score
    8/10
    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks