General

  • Target

    minecraft-1-16-40-02.apk

  • Size

    94.6MB

  • Sample

    240524-f1q9daeh5y

  • MD5

    8b5d2d28bd5505e103a236cd88a38843

  • SHA1

    905ce11f18aa6255b9db62e380c7b8d325ed992a

  • SHA256

    cbae5ed2fe96e2a857c79068421a0734275410769f2468be2883e51a12a8153d

  • SHA512

    24d1880a1c6b9d4b2ef8bbfe09cb6ad623d0aa00cbc725e7d3b27518a05bcff23723d9199849f032382e60f45186b57cd92426f3a2ab5709267cc8f8365eb527

  • SSDEEP

    1572864:JIWt3uIAdW5pkmIujwriEK47/gIPqPecT/3wGRJxOC1nYv5NW9k1nzplC3HPgOn6:JNkIAde2m2iEZBPqPecT/3wSxOC1nsdB

Malware Config

Targets

    • Target

      minecraft-1-16-40-02.apk

    • Size

      94.6MB

    • MD5

      8b5d2d28bd5505e103a236cd88a38843

    • SHA1

      905ce11f18aa6255b9db62e380c7b8d325ed992a

    • SHA256

      cbae5ed2fe96e2a857c79068421a0734275410769f2468be2883e51a12a8153d

    • SHA512

      24d1880a1c6b9d4b2ef8bbfe09cb6ad623d0aa00cbc725e7d3b27518a05bcff23723d9199849f032382e60f45186b57cd92426f3a2ab5709267cc8f8365eb527

    • SSDEEP

      1572864:JIWt3uIAdW5pkmIujwriEK47/gIPqPecT/3wGRJxOC1nYv5NW9k1nzplC3HPgOn6:JNkIAde2m2iEZBPqPecT/3wSxOC1nsdB

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks