General

  • Target

    app.apk

  • Size

    6.8MB

  • Sample

    240523-pqpr8shh98

  • MD5

    aa6c73ca48f59503e6ceea1cb145b8dd

  • SHA1

    2664f200027eb6ba6e03b1bff7679869b234c594

  • SHA256

    e0429af00e61838415b4c5238ebed8286507318d81c27b697cce871aaeee11fa

  • SHA512

    7b845134fabd8ff9b07b26ae27ee097d86684b7eca633ef7a0f9302c8db37e722326a195d8c2d403a98178ff9de4d61e228ff7eb8a874c3b7d6ad794fb285305

  • SSDEEP

    98304:+HSXDZaqLFrPaEwIM1RBO0d92G6zM7JbPg34PtHsshoe7VNGs9bbAuNLHPpY2fss:+yX0qBn8iUH6QT1Hsve7VMsRbAIxY8

Malware Config

Targets

    • Target

      app.apk

    • Size

      6.8MB

    • MD5

      aa6c73ca48f59503e6ceea1cb145b8dd

    • SHA1

      2664f200027eb6ba6e03b1bff7679869b234c594

    • SHA256

      e0429af00e61838415b4c5238ebed8286507318d81c27b697cce871aaeee11fa

    • SHA512

      7b845134fabd8ff9b07b26ae27ee097d86684b7eca633ef7a0f9302c8db37e722326a195d8c2d403a98178ff9de4d61e228ff7eb8a874c3b7d6ad794fb285305

    • SSDEEP

      98304:+HSXDZaqLFrPaEwIM1RBO0d92G6zM7JbPg34PtHsshoe7VNGs9bbAuNLHPpY2fss:+yX0qBn8iUH6QT1Hsve7VMsRbAIxY8

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks