General

  • Target

    taimeng.apk

  • Size

    12.6MB

  • Sample

    240523-prwbeaab26

  • MD5

    f7cd65c253fb7f8ef6984380d0c11e68

  • SHA1

    8bad78638b10443a4a0ab0b317919361654a5312

  • SHA256

    125ecd5f07d7071c35b050c1ae6ed0d76bb473d81d1aa46b921c00a6aaa30f4e

  • SHA512

    26af31c5834539948ad3afe42b16d4e5cf2e68edf261aa867c4c38298921309fb0eff606b91699dec9b72f0e42bcd28d85faa9deb7ffad64af7fe8247e047534

  • SSDEEP

    393216:zerLX1o4iy8h122Uc/xOU7/gLo0LHnzwpwkIwc:6rymqlrzmnH8pwl

Malware Config

Targets

    • Target

      taimeng.apk

    • Size

      12.6MB

    • MD5

      f7cd65c253fb7f8ef6984380d0c11e68

    • SHA1

      8bad78638b10443a4a0ab0b317919361654a5312

    • SHA256

      125ecd5f07d7071c35b050c1ae6ed0d76bb473d81d1aa46b921c00a6aaa30f4e

    • SHA512

      26af31c5834539948ad3afe42b16d4e5cf2e68edf261aa867c4c38298921309fb0eff606b91699dec9b72f0e42bcd28d85faa9deb7ffad64af7fe8247e047534

    • SSDEEP

      393216:zerLX1o4iy8h122Uc/xOU7/gLo0LHnzwpwkIwc:6rymqlrzmnH8pwl

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks