General

  • Target

    01bd7edf9a3424a3ecea72a412275808.apk

  • Size

    5.8MB

  • Sample

    240611-mkwmgsthln

  • MD5

    01bd7edf9a3424a3ecea72a412275808

  • SHA1

    9ec6c11baae31e478955df9f778794d22adca602

  • SHA256

    ebf849b931a7da177013dda573cb7e728405966b8d21a4c034c1c8399d4fa8de

  • SHA512

    0357473234f31ef34cc486fece426513af58b56515ef0069e1b3c36342fcde71af8dee96fbc6f7e7b2ba9e99d790e005b6749a691e19042614e313e1e3614c20

  • SSDEEP

    98304:Q34k5zQpYB24Wwj5JpIUUR99mfD0sQ4bKjqp8Cpgr3qP:Q3x5cxLwj7pIh3t4b9ioB

Malware Config

Targets

    • Target

      01bd7edf9a3424a3ecea72a412275808.apk

    • Size

      5.8MB

    • MD5

      01bd7edf9a3424a3ecea72a412275808

    • SHA1

      9ec6c11baae31e478955df9f778794d22adca602

    • SHA256

      ebf849b931a7da177013dda573cb7e728405966b8d21a4c034c1c8399d4fa8de

    • SHA512

      0357473234f31ef34cc486fece426513af58b56515ef0069e1b3c36342fcde71af8dee96fbc6f7e7b2ba9e99d790e005b6749a691e19042614e313e1e3614c20

    • SSDEEP

      98304:Q34k5zQpYB24Wwj5JpIUUR99mfD0sQ4bKjqp8Cpgr3qP:Q3x5cxLwj7pIh3t4b9ioB

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

MITRE ATT&CK Matrix

Tasks