General

  • Target

    GODSARMY4K1.apk

  • Size

    9.8MB

  • Sample

    240523-nv3n8aeh73

  • MD5

    27d17da20cac1db56a0d7ac5374a2019

  • SHA1

    e40c2b9fbbe62cb6f1b03c057ad0be4c1ec879e5

  • SHA256

    6598df0d861a1b5f46b55c04aca92b74b97cd1bf62af40c96540a26b0ad8d9d7

  • SHA512

    bfeb08b181f6ac1f66b92f2dba93ba17814599f470e66833f50c5574a5065c8996e994ed1807748ec5da3f511e50db0004c855fe3903eb86f3dc5d3e186fd397

  • SSDEEP

    196608:1WgfkkmLO1qS81DJexwrsLaIg9DQVc4xjR3/2Tm4y6:1WKmai3TnJyRwR

Malware Config

Targets

    • Target

      GODSARMY4K1.apk

    • Size

      9.8MB

    • MD5

      27d17da20cac1db56a0d7ac5374a2019

    • SHA1

      e40c2b9fbbe62cb6f1b03c057ad0be4c1ec879e5

    • SHA256

      6598df0d861a1b5f46b55c04aca92b74b97cd1bf62af40c96540a26b0ad8d9d7

    • SHA512

      bfeb08b181f6ac1f66b92f2dba93ba17814599f470e66833f50c5574a5065c8996e994ed1807748ec5da3f511e50db0004c855fe3903eb86f3dc5d3e186fd397

    • SSDEEP

      196608:1WgfkkmLO1qS81DJexwrsLaIg9DQVc4xjR3/2Tm4y6:1WKmai3TnJyRwR

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks