General

  • Target

    link_20200527175802.apk

  • Size

    7.7MB

  • Sample

    240523-pxd93saf24

  • MD5

    e80f18280ae16ef6fd5cf22fe6acdb44

  • SHA1

    2c99388a2e09617da33a105ea7454ded6936d59d

  • SHA256

    b58b7477e636565dc2f1ec838bd8f7fd6fcb14361ecc1594fd768c33c408b55e

  • SHA512

    213c8d95e56fd333fbb838e59f0aa480c300da8b9d4235bc1950e2dc8ff2a08d2dfdab7a27003c735245d9fd756058e9dff5585ba3299d8b0913af4202fc307d

  • SSDEEP

    196608:K4L3hozBM7yp8L9etSwO7Bo606U9kQ4A9I:K4L3s8LGt6o6ZU97LI

Malware Config

Targets

    • Target

      link_20200527175802.apk

    • Size

      7.7MB

    • MD5

      e80f18280ae16ef6fd5cf22fe6acdb44

    • SHA1

      2c99388a2e09617da33a105ea7454ded6936d59d

    • SHA256

      b58b7477e636565dc2f1ec838bd8f7fd6fcb14361ecc1594fd768c33c408b55e

    • SHA512

      213c8d95e56fd333fbb838e59f0aa480c300da8b9d4235bc1950e2dc8ff2a08d2dfdab7a27003c735245d9fd756058e9dff5585ba3299d8b0913af4202fc307d

    • SSDEEP

      196608:K4L3hozBM7yp8L9etSwO7Bo606U9kQ4A9I:K4L3s8LGt6o6ZU97LI

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks