General

  • Target

    tentacle locker_1.0_APKPure.apk

  • Size

    29.1MB

  • Sample

    240523-d9axmscf6x

  • MD5

    1465348187503c832b526822198a8bce

  • SHA1

    cbdd6941483eb54c6de174f47e59fbaea86245f0

  • SHA256

    0592bd0cd486386a40c271ce4bd8f6b04d2924e8ce37202fe86bfe160eb27f78

  • SHA512

    ab216e460ea7e51f951067d0e0f4741c4391e05ec196672d42718c928ef2ba5c0029779d40b6f42e2c83faf3fe84ed04b94bbc0c282f49d26e17cd0af7c69147

  • SSDEEP

    786432:0oLmgbLScJa5QeSoKsNmiFR8dIBhhqpZU8Hc3rWzauNODJwbv:/9LScPJsQiFR8Oh+ZlWuN8Kv

Malware Config

Targets

    • Target

      tentacle locker_1.0_APKPure.apk

    • Size

      29.1MB

    • MD5

      1465348187503c832b526822198a8bce

    • SHA1

      cbdd6941483eb54c6de174f47e59fbaea86245f0

    • SHA256

      0592bd0cd486386a40c271ce4bd8f6b04d2924e8ce37202fe86bfe160eb27f78

    • SHA512

      ab216e460ea7e51f951067d0e0f4741c4391e05ec196672d42718c928ef2ba5c0029779d40b6f42e2c83faf3fe84ed04b94bbc0c282f49d26e17cd0af7c69147

    • SSDEEP

      786432:0oLmgbLScJa5QeSoKsNmiFR8dIBhhqpZU8Hc3rWzauNODJwbv:/9LScPJsQiFR8Oh+ZlWuN8Kv

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks