General

  • Target

    Picsart_v25.0.4_modded_by_Mixroot.apk

  • Size

    74.5MB

  • Sample

    240605-rgp3rahd4w

  • MD5

    444c6ecb43f8a2eb33368ad2729d67eb

  • SHA1

    d074dcf9dffab81ed8bc346a8d7741c18d12547e

  • SHA256

    ca128f703a785a13a36d17c3994cd8ba17ec4bed267e8fc012ad6acc78de07b8

  • SHA512

    5bd9e07ba258e939caf0613180eb9204db366d84062840e9bc422ba415d64f6761d675452009ac1fda874704a29266f8c7bd0c4d065966b5125d3fe230bfb900

  • SSDEEP

    1572864:yTwwaWp18/jk9x0yevuMJ8kOzz4sLz3BABwgbeIu5:AwwaWQbk9TevuM/Ozc66KIK

Malware Config

Targets

    • Target

      Picsart_v25.0.4_modded_by_Mixroot.apk

    • Size

      74.5MB

    • MD5

      444c6ecb43f8a2eb33368ad2729d67eb

    • SHA1

      d074dcf9dffab81ed8bc346a8d7741c18d12547e

    • SHA256

      ca128f703a785a13a36d17c3994cd8ba17ec4bed267e8fc012ad6acc78de07b8

    • SHA512

      5bd9e07ba258e939caf0613180eb9204db366d84062840e9bc422ba415d64f6761d675452009ac1fda874704a29266f8c7bd0c4d065966b5125d3fe230bfb900

    • SSDEEP

      1572864:yTwwaWp18/jk9x0yevuMJ8kOzz4sLz3BABwgbeIu5:AwwaWQbk9TevuM/Ozc66KIK

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks