Resubmissions

General

  • Target

    sweet_money.apk

  • Size

    2.2MB

  • Sample

    240603-h23d5sgh87

  • MD5

    03458d50e42a3049151eaab58c6558f7

  • SHA1

    ab35625daea198ae2c7247535378711708ea89a9

  • SHA256

    822994ed323ebf67ecba1727fda7f12bbc0f83633a8d25a5040bdd13d0498fcc

  • SHA512

    6204d7649ae945a2a445615ebf7c8813a57083fdd8630f2b26e0ef1908f5a68ec959a28af8b47926d9b4bed84c81b4062c4725372d64d9f789dd5e4266e52771

  • SSDEEP

    49152:En6sEye5VLvMM8+Sa8vf2i088I6Nf5LE0lg7yAd3PpU8dronku05:FZx5Rpwf2i08/oBtg7yudronkuE

Malware Config

Targets

    • Target

      sweet_money.apk

    • Size

      2.2MB

    • MD5

      03458d50e42a3049151eaab58c6558f7

    • SHA1

      ab35625daea198ae2c7247535378711708ea89a9

    • SHA256

      822994ed323ebf67ecba1727fda7f12bbc0f83633a8d25a5040bdd13d0498fcc

    • SHA512

      6204d7649ae945a2a445615ebf7c8813a57083fdd8630f2b26e0ef1908f5a68ec959a28af8b47926d9b4bed84c81b4062c4725372d64d9f789dd5e4266e52771

    • SSDEEP

      49152:En6sEye5VLvMM8+Sa8vf2i088I6Nf5LE0lg7yAd3PpU8dronku05:FZx5Rpwf2i08/oBtg7yudronkuE

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of photos stored on the user's device.

    • Reads the content of the calendar entry data.

    • Reads the content of the call log.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks