General

  • Target

    3100d93eee64915f398431964ade4868ba7d25611f27af5362fa02303e91807c

  • Size

    15.7MB

  • Sample

    240524-ptj16acd4v

  • MD5

    a37e82fdd1e3eb978871756abc1d5aae

  • SHA1

    7b4cc5629a9bc76de79663c41584d579f43b7928

  • SHA256

    3100d93eee64915f398431964ade4868ba7d25611f27af5362fa02303e91807c

  • SHA512

    0df7e6a9db64fc764a1aa8bf313d94eb6ae5d00efd6a33c030364351b8fe190f36a95ef1725af2f1628fa69af4df432219b3c0eb70069f472596cd724eeb6e6b

  • SSDEEP

    393216:eRDtq/0L2gHLqryWfXmmKrGl++44XVfUyvzxZ0sWpa:epQVgHuryaXmmr144OyvzxZ09s

Malware Config

Targets

    • Target

      3100d93eee64915f398431964ade4868ba7d25611f27af5362fa02303e91807c

    • Size

      15.7MB

    • MD5

      a37e82fdd1e3eb978871756abc1d5aae

    • SHA1

      7b4cc5629a9bc76de79663c41584d579f43b7928

    • SHA256

      3100d93eee64915f398431964ade4868ba7d25611f27af5362fa02303e91807c

    • SHA512

      0df7e6a9db64fc764a1aa8bf313d94eb6ae5d00efd6a33c030364351b8fe190f36a95ef1725af2f1628fa69af4df432219b3c0eb70069f472596cd724eeb6e6b

    • SSDEEP

      393216:eRDtq/0L2gHLqryWfXmmKrGl++44XVfUyvzxZ0sWpa:epQVgHuryaXmmr144OyvzxZ09s

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks