General

  • Target

    db66c2f19f9daec9daee98c69c7f079851edd141255d6f36051d613d875c2a27.bin

  • Size

    2.7MB

  • Sample

    240528-1w4zwsea9t

  • MD5

    6596fb7acb84d2504ea745d154504774

  • SHA1

    063a172e35877da4cd333b181a4f6250d08a9dd0

  • SHA256

    db66c2f19f9daec9daee98c69c7f079851edd141255d6f36051d613d875c2a27

  • SHA512

    4ac100d49dab8742c09b6e6a3797034b2bb3e59c8e78ac569fe740e8ad1eae4f6ed04f7957e87a71b0738c9e5668d8d52976a64b9d6215d6082f052489d69d77

  • SSDEEP

    49152:NDEnq/W9aV8puallO1FdKOQI0VgZSeo/KrmH:NDEnq/c8FdKOQmo/KrmH

Malware Config

Targets

    • Target

      db66c2f19f9daec9daee98c69c7f079851edd141255d6f36051d613d875c2a27.bin

    • Size

      2.7MB

    • MD5

      6596fb7acb84d2504ea745d154504774

    • SHA1

      063a172e35877da4cd333b181a4f6250d08a9dd0

    • SHA256

      db66c2f19f9daec9daee98c69c7f079851edd141255d6f36051d613d875c2a27

    • SHA512

      4ac100d49dab8742c09b6e6a3797034b2bb3e59c8e78ac569fe740e8ad1eae4f6ed04f7957e87a71b0738c9e5668d8d52976a64b9d6215d6082f052489d69d77

    • SSDEEP

      49152:NDEnq/W9aV8puallO1FdKOQI0VgZSeo/KrmH:NDEnq/c8FdKOQmo/KrmH

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks