General

  • Target

    Vusic.apk

  • Size

    12.4MB

  • Sample

    240522-pd2k9shf2y

  • MD5

    c78a440a1bcb896399c34a329efc0126

  • SHA1

    9660f36a4cde9adfd811f7fe57bc786f7d8b59b5

  • SHA256

    08cbab62390b15a8acb042f119fef48daa5ca554266a8898ef9ac0009a019365

  • SHA512

    b8efc2c98214d86d5107e317f518fbb037610a5cd75368e1082f087b2d906fb53184acb7823a471eec9c781367002c2743a6e5820739ba6270631e6281d1889a

  • SSDEEP

    393216:psE8W6Iz2CFZl7lEijV6B1LyQQEGbmpb1F:6E8cxFZl/V6BlyQQNKj

Malware Config

Targets

    • Target

      Vusic.apk

    • Size

      12.4MB

    • MD5

      c78a440a1bcb896399c34a329efc0126

    • SHA1

      9660f36a4cde9adfd811f7fe57bc786f7d8b59b5

    • SHA256

      08cbab62390b15a8acb042f119fef48daa5ca554266a8898ef9ac0009a019365

    • SHA512

      b8efc2c98214d86d5107e317f518fbb037610a5cd75368e1082f087b2d906fb53184acb7823a471eec9c781367002c2743a6e5820739ba6270631e6281d1889a

    • SSDEEP

      393216:psE8W6Iz2CFZl7lEijV6B1LyQQEGbmpb1F:6E8cxFZl/V6BlyQQNKj

    • Checks if the Android device is rooted.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks