General

  • Target

    03c65a2a28a282490f73912e36657bca5b5b5b137b7b1e7bb55c72bcfe72799a

  • Size

    1.7MB

  • Sample

    240524-p1cwesdc99

  • MD5

    53901acffac8a2708e4bcc64a39db617

  • SHA1

    2ca00b21d898b0758c6cf962e669711415eb0218

  • SHA256

    03c65a2a28a282490f73912e36657bca5b5b5b137b7b1e7bb55c72bcfe72799a

  • SHA512

    874190ae7c9303396f54e0f1baea3b7b1710a4e2809cca00aafbd048d753de4b14462f514c5021001d43be6fbc4b2fe1d1e7214a0099da9c001454769f8f908e

  • SSDEEP

    24576:iK4MuX+W7IJxYqoIg9V+sj8vl8nhDlviMzHWqg0QcECqabv4eEj1:iK8+WU7Yqo9uqslALzHWKvR1v/Ej1

Malware Config

Targets

    • Target

      03c65a2a28a282490f73912e36657bca5b5b5b137b7b1e7bb55c72bcfe72799a

    • Size

      1.7MB

    • MD5

      53901acffac8a2708e4bcc64a39db617

    • SHA1

      2ca00b21d898b0758c6cf962e669711415eb0218

    • SHA256

      03c65a2a28a282490f73912e36657bca5b5b5b137b7b1e7bb55c72bcfe72799a

    • SHA512

      874190ae7c9303396f54e0f1baea3b7b1710a4e2809cca00aafbd048d753de4b14462f514c5021001d43be6fbc4b2fe1d1e7214a0099da9c001454769f8f908e

    • SSDEEP

      24576:iK4MuX+W7IJxYqoIg9V+sj8vl8nhDlviMzHWqg0QcECqabv4eEj1:iK8+WU7Yqo9uqslALzHWKvR1v/Ej1

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks