General

  • Target

    VirusShare_372bd1c659d7712fd64913701f97c98d

  • Size

    206KB

  • Sample

    240610-mc71jsgd36

  • MD5

    372bd1c659d7712fd64913701f97c98d

  • SHA1

    1761e50a487907e7411afa8ca96e3edd8f981415

  • SHA256

    a5f077d133d154070006b4c13bc5a01c114a7478fc4b07d0b2140c81466495b4

  • SHA512

    703ea5e5ed244646757163975fe4ddc66e9e56d6e0c7d0be9acc6ee04ca1a0612dda8a7faac33b8b8ba92945ff0fad43a0920f4ff4ca342df4f4f2c05f4b9499

  • SSDEEP

    6144:pi39uWLyjyblpEjt9MOinwfzBmGY8JpXxGMVHRGWV37:pIF+jklyvMO0wUGY83xiy7

Malware Config

Targets

    • Target

      VirusShare_372bd1c659d7712fd64913701f97c98d

    • Size

      206KB

    • MD5

      372bd1c659d7712fd64913701f97c98d

    • SHA1

      1761e50a487907e7411afa8ca96e3edd8f981415

    • SHA256

      a5f077d133d154070006b4c13bc5a01c114a7478fc4b07d0b2140c81466495b4

    • SHA512

      703ea5e5ed244646757163975fe4ddc66e9e56d6e0c7d0be9acc6ee04ca1a0612dda8a7faac33b8b8ba92945ff0fad43a0920f4ff4ca342df4f4f2c05f4b9499

    • SSDEEP

      6144:pi39uWLyjyblpEjt9MOinwfzBmGY8JpXxGMVHRGWV37:pIF+jklyvMO0wUGY83xiy7

    • Removes its main activity from the application launcher

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks