General

  • Target

    gmod_Mods_Mods_&_Maps_for_Gorilla_Tag_8.0_apkcombo.com.apk

  • Size

    40.8MB

  • Sample

    240523-3pcceadf58

  • MD5

    3a6830de74c6dd975e0160c7b9f359a6

  • SHA1

    c7449c1259b17a5bcc0655b4b8a315ca4c021835

  • SHA256

    fd19e5cb0128aacc237d3f6e3434916ea1fc197a27208bfd252f894b3f62cedd

  • SHA512

    fa89d593c9ef8bf06987038fe8c507b1a18e7fc200d16d8f587276440410f8bf9889cccbce09474595b790683de720a1f21fdd64fe88b64eea8efe0f2cfd0222

  • SSDEEP

    786432:tdtZ1Ael9uf9X33ISSPSqpE/Vlp5vpNLN/d6NFv7btZTSNHmJir27pnI7hJWTi1:td1AenUx33r/Vl7LRd63v7pNoGJiq94z

Malware Config

Targets

    • Target

      gmod_Mods_Mods_&_Maps_for_Gorilla_Tag_8.0_apkcombo.com.apk

    • Size

      40.8MB

    • MD5

      3a6830de74c6dd975e0160c7b9f359a6

    • SHA1

      c7449c1259b17a5bcc0655b4b8a315ca4c021835

    • SHA256

      fd19e5cb0128aacc237d3f6e3434916ea1fc197a27208bfd252f894b3f62cedd

    • SHA512

      fa89d593c9ef8bf06987038fe8c507b1a18e7fc200d16d8f587276440410f8bf9889cccbce09474595b790683de720a1f21fdd64fe88b64eea8efe0f2cfd0222

    • SSDEEP

      786432:tdtZ1Ael9uf9X33ISSPSqpE/Vlp5vpNLN/d6NFv7btZTSNHmJir27pnI7hJWTi1:td1AenUx33r/Vl7LRd63v7pNoGJiq94z

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks