General

  • Target

    cRY_Handset-release-prd.apk

  • Size

    7.0MB

  • Sample

    240523-psgjmshh91

  • MD5

    6fe805ec9fde70be8babab0955653553

  • SHA1

    565b0a6b6aaa4c57c7bc03ee26b02a840dec6299

  • SHA256

    4fbb94464ffc589c6bb8b57836e4b635400b370def2f1bf24c5e69a445cf0403

  • SHA512

    5f74469215bbe714a69a8d92a82e31af94854ddc307d32386d1aebd51e277c359c83ac9ecda1d787d28860fbbdd98fe8c5c2475f5739e68cd67f4fd3f12cc779

  • SSDEEP

    98304:OYyrK3cs2UPvwCq+3JhCn1Z6Yh2gd+gXiaIkbdCGK70iuKfZCzNaG48sZxDklso6:OY1h2UgBaJ410qxbW73fIzNaT/lBDI4

Malware Config

Targets

    • Target

      cRY_Handset-release-prd.apk

    • Size

      7.0MB

    • MD5

      6fe805ec9fde70be8babab0955653553

    • SHA1

      565b0a6b6aaa4c57c7bc03ee26b02a840dec6299

    • SHA256

      4fbb94464ffc589c6bb8b57836e4b635400b370def2f1bf24c5e69a445cf0403

    • SHA512

      5f74469215bbe714a69a8d92a82e31af94854ddc307d32386d1aebd51e277c359c83ac9ecda1d787d28860fbbdd98fe8c5c2475f5739e68cd67f4fd3f12cc779

    • SSDEEP

      98304:OYyrK3cs2UPvwCq+3JhCn1Z6Yh2gd+gXiaIkbdCGK70iuKfZCzNaG48sZxDklso6:OY1h2UgBaJ410qxbW73fIzNaT/lBDI4

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks