General

  • Target

    bsd_brawl_v55.211_(24).apk

  • Size

    701.6MB

  • Sample

    240522-xassyscd46

  • MD5

    9a9fd187caecab754fd5c764ff60b86d

  • SHA1

    86f803f5856eb05e76b8051cb2500667f2efa39c

  • SHA256

    568e99ef7ddace784f181d18b4a68f995eb60c548c828a366feab8663d4ae15f

  • SHA512

    0a4264635099cba9e14bf8bd4da078540d2dd4390b5b12ac8b9118088f98817c08dc12ee96a955cbdcf00685a74bb53bd125aa751035f4b3210010fd28d7be57

  • SSDEEP

    12582912:GWQk5WdXlQP57cQMNsP5SdKqIYu9q1UCux64SXzfDYcRnKGGnGBLhS5HS3NRjJLe:PQk4XlQBWN85wUY+56tQ0KGGnuS526

Malware Config

Targets

    • Target

      bsd_brawl_v55.211_(24).apk

    • Size

      701.6MB

    • MD5

      9a9fd187caecab754fd5c764ff60b86d

    • SHA1

      86f803f5856eb05e76b8051cb2500667f2efa39c

    • SHA256

      568e99ef7ddace784f181d18b4a68f995eb60c548c828a366feab8663d4ae15f

    • SHA512

      0a4264635099cba9e14bf8bd4da078540d2dd4390b5b12ac8b9118088f98817c08dc12ee96a955cbdcf00685a74bb53bd125aa751035f4b3210010fd28d7be57

    • SSDEEP

      12582912:GWQk5WdXlQP57cQMNsP5SdKqIYu9q1UCux64SXzfDYcRnKGGnGBLhS5HS3NRjJLe:PQk4XlQBWN85wUY+56tQ0KGGnuS526

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks