General

  • Target

    33b3cde31744911ffb8a070754c9817aa4a7a2cdff3138dd4a1f6b20a8be9877.apk

  • Size

    72.1MB

  • Sample

    240527-bevbpaaf61

  • MD5

    53b225f27ea6f2e09cd7ab4654a3ea7b

  • SHA1

    dc03b77b12493f12701ae5b256c6d03ff718fdd1

  • SHA256

    33b3cde31744911ffb8a070754c9817aa4a7a2cdff3138dd4a1f6b20a8be9877

  • SHA512

    f0c2bd558a7b0a91e915545fc3405ab26633f8d438147b176e4b7e930674f596f397d7bf1696b4de0157c7d714761d476470c09198598fce5262e5c86d1e9df2

  • SSDEEP

    1572864:hiHeLa4QNREM6SlSh+sJPC2DnPwpJk8aP:XO9N69TPbP

Malware Config

Targets

    • Target

      33b3cde31744911ffb8a070754c9817aa4a7a2cdff3138dd4a1f6b20a8be9877.apk

    • Size

      72.1MB

    • MD5

      53b225f27ea6f2e09cd7ab4654a3ea7b

    • SHA1

      dc03b77b12493f12701ae5b256c6d03ff718fdd1

    • SHA256

      33b3cde31744911ffb8a070754c9817aa4a7a2cdff3138dd4a1f6b20a8be9877

    • SHA512

      f0c2bd558a7b0a91e915545fc3405ab26633f8d438147b176e4b7e930674f596f397d7bf1696b4de0157c7d714761d476470c09198598fce5262e5c86d1e9df2

    • SSDEEP

      1572864:hiHeLa4QNREM6SlSh+sJPC2DnPwpJk8aP:XO9N69TPbP

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks