General

  • Target

    Projectivy Launcher_4.24_Apkpure.apk

  • Size

    7.4MB

  • Sample

    240604-bfkhwage68

  • MD5

    d1059c732fa38ef45654c31d9cb55bc1

  • SHA1

    7ffd616f00aa96e1285f2c9de5f4bcb75e9ceff0

  • SHA256

    3b5f88556f295dd725d74a9e322e31545436cb5ba6d39c2e75d289462c63d125

  • SHA512

    f583351458f7688f71a73144c05c383db03bb324c77df3b742df5461ee4974b4f1a6869569897c50eadc2227288b513dd931f301f36fd3ace1c3bf5bf2357842

  • SSDEEP

    98304:JPfTtT9UH/U1oHN562aoGMpOOCxpPc/ZDc7shvbSA+ORKSTCdi0rmm8x+Pv:lTx9UH/WeXaeCxpPcDw8+ORKsW8x+X

Malware Config

Targets

    • Target

      Projectivy Launcher_4.24_Apkpure.apk

    • Size

      7.4MB

    • MD5

      d1059c732fa38ef45654c31d9cb55bc1

    • SHA1

      7ffd616f00aa96e1285f2c9de5f4bcb75e9ceff0

    • SHA256

      3b5f88556f295dd725d74a9e322e31545436cb5ba6d39c2e75d289462c63d125

    • SHA512

      f583351458f7688f71a73144c05c383db03bb324c77df3b742df5461ee4974b4f1a6869569897c50eadc2227288b513dd931f301f36fd3ace1c3bf5bf2357842

    • SSDEEP

      98304:JPfTtT9UH/U1oHN562aoGMpOOCxpPc/ZDc7shvbSA+ORKSTCdi0rmm8x+Pv:lTx9UH/WeXaeCxpPcDw8+ORKsW8x+X

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks