General

  • Target

    Game+Booster+v2.0.0+(Premium).apk

  • Size

    14.6MB

  • Sample

    240611-kkgr8a1flr

  • MD5

    bddcc0fe9893f18c1fb661603e6e1b57

  • SHA1

    0818d9c5afa036d051e3024f8f7c80eeec6e52a1

  • SHA256

    a7c7430792525572322b505de9a1e2119e85962e8e602feb878a042ab7bd2de9

  • SHA512

    afeb536e93274a943c033bc5127a2cfb7b366ad6330e884f177b9afad0d15cae9e9c3a722f96ffae6ca6084e75060c1e8736609158fa2bec8582bb98c6ab2e46

  • SSDEEP

    393216:KNmrAAb551sLKTBDG66S3NQ5IAt57nUM2153Z:Kyb3bTF/9o/7nYJ

Malware Config

Targets

    • Target

      Game+Booster+v2.0.0+(Premium).apk

    • Size

      14.6MB

    • MD5

      bddcc0fe9893f18c1fb661603e6e1b57

    • SHA1

      0818d9c5afa036d051e3024f8f7c80eeec6e52a1

    • SHA256

      a7c7430792525572322b505de9a1e2119e85962e8e602feb878a042ab7bd2de9

    • SHA512

      afeb536e93274a943c033bc5127a2cfb7b366ad6330e884f177b9afad0d15cae9e9c3a722f96ffae6ca6084e75060c1e8736609158fa2bec8582bb98c6ab2e46

    • SSDEEP

      393216:KNmrAAb551sLKTBDG66S3NQ5IAt57nUM2153Z:Kyb3bTF/9o/7nYJ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks