General

  • Target

    113.apk

  • Size

    3.7MB

  • Sample

    240531-qqnevaab6x

  • MD5

    5ddd2510f24b496ea0f94704d02fe009

  • SHA1

    e08917173eb1e9e4815a0df53fb82852a07a5e26

  • SHA256

    24059f993c2b14c44f2ed8aa120ee28e71fe4fb5a2f823e7da789854d8168876

  • SHA512

    b3f33db57ca0b403d7e5beee621c2000d7846dd2501011f0a969c60de9f90c848d69953af9bceff5bf598eafb53eebf5f62885569b910bc8eb6ff9ff2bf7b8e9

  • SSDEEP

    98304:YKjG0z5QYNVSg9yl3cPVxZhykzYLm7o/KrOZgC2f:YJ0NQYug9ylMdxzyLLmogCW

Malware Config

Targets

    • Target

      113.apk

    • Size

      3.7MB

    • MD5

      5ddd2510f24b496ea0f94704d02fe009

    • SHA1

      e08917173eb1e9e4815a0df53fb82852a07a5e26

    • SHA256

      24059f993c2b14c44f2ed8aa120ee28e71fe4fb5a2f823e7da789854d8168876

    • SHA512

      b3f33db57ca0b403d7e5beee621c2000d7846dd2501011f0a969c60de9f90c848d69953af9bceff5bf598eafb53eebf5f62885569b910bc8eb6ff9ff2bf7b8e9

    • SSDEEP

      98304:YKjG0z5QYNVSg9yl3cPVxZhykzYLm7o/KrOZgC2f:YJ0NQYug9ylMdxzyLLmogCW

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks