General
-
Target
dad371ac05fcaee039d6dc6ee76886362dc890fee5dd2fe63eff21219c04fe1e
-
Size
10.2MB
-
Sample
240524-przc3acb71
-
MD5
4ec1ec4dbcb62e5a6821046d5c6d771e
-
SHA1
7730695d5a5dd63e3b985b5b5e91f5ddcb90512a
-
SHA256
dad371ac05fcaee039d6dc6ee76886362dc890fee5dd2fe63eff21219c04fe1e
-
SHA512
7d007c62f77412b42f799d5b21a271b7105c94b9ff9c3b0716d6f1d04c3428f96b593c315ca0e925bd6a4f23192d3b5a2efc4edb7ee5abc14726e1b103be8d63
-
SSDEEP
196608:iO9FHhdTaDVQ0QdH4ZnKqZY6FmTfNMpeRjO3E+DsChFhJ/2QFCpsqE2DZtLMA:iO/BdTaDa0TZFoTfNo3LsCD7/2T1ZtB
Behavioral task
behavioral1
Sample
dad371ac05fcaee039d6dc6ee76886362dc890fee5dd2fe63eff21219c04fe1e.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
dad371ac05fcaee039d6dc6ee76886362dc890fee5dd2fe63eff21219c04fe1e
-
Size
10.2MB
-
MD5
4ec1ec4dbcb62e5a6821046d5c6d771e
-
SHA1
7730695d5a5dd63e3b985b5b5e91f5ddcb90512a
-
SHA256
dad371ac05fcaee039d6dc6ee76886362dc890fee5dd2fe63eff21219c04fe1e
-
SHA512
7d007c62f77412b42f799d5b21a271b7105c94b9ff9c3b0716d6f1d04c3428f96b593c315ca0e925bd6a4f23192d3b5a2efc4edb7ee5abc14726e1b103be8d63
-
SSDEEP
196608:iO9FHhdTaDVQ0QdH4ZnKqZY6FmTfNMpeRjO3E+DsChFhJ/2QFCpsqE2DZtLMA:iO/BdTaDa0TZFoTfNo3LsCD7/2T1ZtB
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Virtualization/Sandbox Evasion
1System Checks
1