General

  • Target

    8.apk

  • Size

    4.4MB

  • Sample

    240524-pxfsxacg6x

  • MD5

    03621b63564fa891a5f20f946323d3c6

  • SHA1

    789172c78da45921035932147ae55a61cd74dbf9

  • SHA256

    01a70df936b8d827be6f689ffe9c0b798c45bab8e543106113aa88ddd9c76ec2

  • SHA512

    55965fca9488cf0edbec75418fa2c42b434c205a1d89a48e068024a2d1e7547a909608cc26657aba4891ba5659f8948f11cbeaccf09aa1e241a57b96e246fd55

  • SSDEEP

    98304:HmP2dEvZCQGO17qWa+db9XVHz4co7ePw6b+fRf:GedEvcQGIdbllto7ePfbURf

Malware Config

Targets

    • Target

      8.apk

    • Size

      4.4MB

    • MD5

      03621b63564fa891a5f20f946323d3c6

    • SHA1

      789172c78da45921035932147ae55a61cd74dbf9

    • SHA256

      01a70df936b8d827be6f689ffe9c0b798c45bab8e543106113aa88ddd9c76ec2

    • SHA512

      55965fca9488cf0edbec75418fa2c42b434c205a1d89a48e068024a2d1e7547a909608cc26657aba4891ba5659f8948f11cbeaccf09aa1e241a57b96e246fd55

    • SSDEEP

      98304:HmP2dEvZCQGO17qWa+db9XVHz4co7ePw6b+fRf:GedEvcQGIdbllto7ePfbURf

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks