General

  • Target

    9c050b67f78d8b62de46bbb2c5839e32.bin

  • Size

    29.9MB

  • Sample

    240612-cp2n7ayemc

  • MD5

    9c050b67f78d8b62de46bbb2c5839e32

  • SHA1

    1f949e9ea47499242fbb83ff329607b5dbb421be

  • SHA256

    17beaf1d525aaac16b5ecd6c773189a2dfa28a5cd4a13af9a203528290425f0d

  • SHA512

    084d289caeb3301879a935540b0f3a2791c8ae2399e0d9cba63b915045b92f8642ad472cb47d00d76643d1ac8bc18492c62384e7f1de4dfe92311dbb47e557ff

  • SSDEEP

    786432:p12fU6EcFtiUc+OxD90+ynm6ypVtQQAnWfzNgqmmN:p1286BF03bxJy/0tqYfN

Malware Config

Targets

    • Target

      9c050b67f78d8b62de46bbb2c5839e32.bin

    • Size

      29.9MB

    • MD5

      9c050b67f78d8b62de46bbb2c5839e32

    • SHA1

      1f949e9ea47499242fbb83ff329607b5dbb421be

    • SHA256

      17beaf1d525aaac16b5ecd6c773189a2dfa28a5cd4a13af9a203528290425f0d

    • SHA512

      084d289caeb3301879a935540b0f3a2791c8ae2399e0d9cba63b915045b92f8642ad472cb47d00d76643d1ac8bc18492c62384e7f1de4dfe92311dbb47e557ff

    • SSDEEP

      786432:p12fU6EcFtiUc+OxD90+ynm6ypVtQQAnWfzNgqmmN:p1286BF03bxJy/0tqYfN

    • Checks Android system properties for emulator presence.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks