General

  • Target

    sound.apk

  • Size

    1.9MB

  • Sample

    240528-nwgs5shg3t

  • MD5

    be9926e84db517cf83d4fde92668c46d

  • SHA1

    4d1ad9522ebec32f70c935bc72693f45acdbbc71

  • SHA256

    d47f5b282b7196026f5074c910fabf40318655288296c46d775221913f607bee

  • SHA512

    23e85bbc6228ae3aae3a8b151f3d2689e3b9ca01833d23c5d2f3d0dfa38370374c014792a48fa9fee9f757339df2d545531de825dcb9a74e9ace79f989d1f983

  • SSDEEP

    49152:RaBPvfk4whC31jkqwq/IalOoDCzmH3fOrfyXRjFug9/1:6P3k81jNwq/IEDC2mrfI71

Malware Config

Targets

    • Target

      sound.apk

    • Size

      1.9MB

    • MD5

      be9926e84db517cf83d4fde92668c46d

    • SHA1

      4d1ad9522ebec32f70c935bc72693f45acdbbc71

    • SHA256

      d47f5b282b7196026f5074c910fabf40318655288296c46d775221913f607bee

    • SHA512

      23e85bbc6228ae3aae3a8b151f3d2689e3b9ca01833d23c5d2f3d0dfa38370374c014792a48fa9fee9f757339df2d545531de825dcb9a74e9ace79f989d1f983

    • SSDEEP

      49152:RaBPvfk4whC31jkqwq/IalOoDCzmH3fOrfyXRjFug9/1:6P3k81jNwq/IEDC2mrfI71

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks