General

  • Target

    367b76d4113cc90ffc5080ea754771411bf4f491c51a875333c66f1c392aaa7d.bin

  • Size

    3.5MB

  • Sample

    240613-a785waxgre

  • MD5

    19649072189164746d5cb762792e887b

  • SHA1

    9b55c0d81393557e6cb8cd4fcf551e0797171600

  • SHA256

    367b76d4113cc90ffc5080ea754771411bf4f491c51a875333c66f1c392aaa7d

  • SHA512

    27bd9c5c2757820972c272ee702de4952951695c69678e3331598b1e44c96ed532a62d23281a122e56c38d26fcd8675ddce339b92d4af3941ed65e7db792298b

  • SSDEEP

    98304:5Z1jmQilz739RC6vnVtH0wgXF1ah1bVpd+mm6dqhE/e2PV:1499Q6vVtH0ZFgh1bJ+L6dV22t

Malware Config

Targets

    • Target

      367b76d4113cc90ffc5080ea754771411bf4f491c51a875333c66f1c392aaa7d.bin

    • Size

      3.5MB

    • MD5

      19649072189164746d5cb762792e887b

    • SHA1

      9b55c0d81393557e6cb8cd4fcf551e0797171600

    • SHA256

      367b76d4113cc90ffc5080ea754771411bf4f491c51a875333c66f1c392aaa7d

    • SHA512

      27bd9c5c2757820972c272ee702de4952951695c69678e3331598b1e44c96ed532a62d23281a122e56c38d26fcd8675ddce339b92d4af3941ed65e7db792298b

    • SSDEEP

      98304:5Z1jmQilz739RC6vnVtH0wgXF1ah1bVpd+mm6dqhE/e2PV:1499Q6vVtH0ZFgh1bJ+L6dV22t

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks