General

  • Target

    minecraft-1-17-10(2).apk

  • Size

    123.2MB

  • Sample

    240612-eb9hzszfmh

  • MD5

    41030959b4026c8b04db2dd3290e6878

  • SHA1

    05379926404df5389800e1c47fd9782a89cfc75c

  • SHA256

    431f92d0e1e846206d5c71d19010b6debfb906c91164a419d896fbe69662a460

  • SHA512

    a235cccc2cd6a4733cb38449ecbe4e9f85fe405bdbac4e12cf9ae1c71b0029cd0112995f37742409c185ac721d000e7218ab5f35834cb1685095c52cd9fdffd6

  • SSDEEP

    3145728:YzpV41EIAIP75OiyL68lzCltshFqLMru6NY3Q98T:YzpS1EGT5Ozm88Uh8YPYHT

Malware Config

Targets

    • Target

      minecraft-1-17-10(2).apk

    • Size

      123.2MB

    • MD5

      41030959b4026c8b04db2dd3290e6878

    • SHA1

      05379926404df5389800e1c47fd9782a89cfc75c

    • SHA256

      431f92d0e1e846206d5c71d19010b6debfb906c91164a419d896fbe69662a460

    • SHA512

      a235cccc2cd6a4733cb38449ecbe4e9f85fe405bdbac4e12cf9ae1c71b0029cd0112995f37742409c185ac721d000e7218ab5f35834cb1685095c52cd9fdffd6

    • SSDEEP

      3145728:YzpV41EIAIP75OiyL68lzCltshFqLMru6NY3Q98T:YzpS1EGT5Ozm88Uh8YPYHT

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks