General

  • Target

    Put.apk

  • Size

    12.1MB

  • Sample

    240522-pgvxwsac4t

  • MD5

    c5152f9d4a60ccc803fbd6004c1ce4a6

  • SHA1

    20502adf9dfe12eb9ce828952b3b3351baf95f5f

  • SHA256

    1afe10df205056d781d469734d5d218b126545d33406ca4db7c0db37d558fbd3

  • SHA512

    5257fdd7a045663cd6b556547d8745e9fe11fa14cf3ff57901c10e1e037b58acf5aa30388815a60193bac653ab5e7d7bb52ea5ec09b0d5319883b74aaa2623a4

  • SSDEEP

    393216:AGEIDy815RGkEWQ0/vQc5my0rgd+AOX4N9ot:A92y8Akbn6JI+AOX4m

Malware Config

Targets

    • Target

      Put.apk

    • Size

      12.1MB

    • MD5

      c5152f9d4a60ccc803fbd6004c1ce4a6

    • SHA1

      20502adf9dfe12eb9ce828952b3b3351baf95f5f

    • SHA256

      1afe10df205056d781d469734d5d218b126545d33406ca4db7c0db37d558fbd3

    • SHA512

      5257fdd7a045663cd6b556547d8745e9fe11fa14cf3ff57901c10e1e037b58acf5aa30388815a60193bac653ab5e7d7bb52ea5ec09b0d5319883b74aaa2623a4

    • SSDEEP

      393216:AGEIDy815RGkEWQ0/vQc5my0rgd+AOX4N9ot:A92y8Akbn6JI+AOX4m

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks