Resubmissions

12/06/2024, 03:26

240612-dznezszcqg 8

12/06/2024, 03:00

240612-dhgwwazaqr 8

12/06/2024, 02:48

240612-dal6mazajp 8

12/06/2024, 02:47

240612-c965eazajl 6

General

  • Target

    Star+_Premium_3_luzgamer.com.apk

  • Size

    42.7MB

  • Sample

    240612-dal6mazajp

  • MD5

    45be29620ac9d6e66568252643b50215

  • SHA1

    3af7a3014cb55379df38df116f5dd80b8f1ca572

  • SHA256

    a134a5bb3a96c4def8165911bdf324b21525df3ced03a89647c69c73d16938b0

  • SHA512

    15af87c50dc5f2dbe62a89e3cd188fa2531ebf13991f52ba0c55a4e69fc1d57498ccd694234271dcc7bd857c61db913c150118f2c3f91a1fc6cc7bf99c024101

  • SSDEEP

    786432:4DgYlUt1fyae5Pz21X71xJE1u27VNttsxysZhQK1CQB9rlzpiO2/cD:4Na/E5PaL1xMum1xcKK1n9rlFz2/+

Malware Config

Targets

    • Target

      Star+_Premium_3_luzgamer.com.apk

    • Size

      42.7MB

    • MD5

      45be29620ac9d6e66568252643b50215

    • SHA1

      3af7a3014cb55379df38df116f5dd80b8f1ca572

    • SHA256

      a134a5bb3a96c4def8165911bdf324b21525df3ced03a89647c69c73d16938b0

    • SHA512

      15af87c50dc5f2dbe62a89e3cd188fa2531ebf13991f52ba0c55a4e69fc1d57498ccd694234271dcc7bd857c61db913c150118f2c3f91a1fc6cc7bf99c024101

    • SSDEEP

      786432:4DgYlUt1fyae5Pz21X71xJE1u27VNttsxysZhQK1CQB9rlzpiO2/cD:4Na/E5PaL1xMum1xcKK1n9rlFz2/+

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks