General

  • Target

    ard.apk

  • Size

    12.1MB

  • Sample

    240524-qalw3sec9y

  • MD5

    0532d1d1bbc4308e2b8f3741cc4a0660

  • SHA1

    d3becd08dc625622b9fcccb1e2800b0c33c46c52

  • SHA256

    12120d219afe08c3bf52b66fb485a128537d75dd5bd4295930ece498c3462cb6

  • SHA512

    3e0ae9a8ce309bb9a6d913cd2798ed8864843ebc78a316c30daf778635dae73e3f60b6150031625df18c99f9c6cc3154c8c8bb28b17e9dac2f2b81c0cee44808

  • SSDEEP

    196608:XzFGZeMZazwyNNvpUjdAxDbiG6a+zNDp7qI7F1/b+8xe3rwK2RWIr3ao2V8lVdf:XpZUy+Shbf9sN7qI77j7xe3o2VgT

Malware Config

Targets

    • Target

      ard.apk

    • Size

      12.1MB

    • MD5

      0532d1d1bbc4308e2b8f3741cc4a0660

    • SHA1

      d3becd08dc625622b9fcccb1e2800b0c33c46c52

    • SHA256

      12120d219afe08c3bf52b66fb485a128537d75dd5bd4295930ece498c3462cb6

    • SHA512

      3e0ae9a8ce309bb9a6d913cd2798ed8864843ebc78a316c30daf778635dae73e3f60b6150031625df18c99f9c6cc3154c8c8bb28b17e9dac2f2b81c0cee44808

    • SSDEEP

      196608:XzFGZeMZazwyNNvpUjdAxDbiG6a+zNDp7qI7F1/b+8xe3rwK2RWIr3ao2V8lVdf:XpZUy+Shbf9sN7qI77j7xe3o2VgT

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks