General

  • Target

    7cb3522f42f53efc20d592dd98d112aa.apk

  • Size

    6.2MB

  • Sample

    240613-tv917awdma

  • MD5

    7cb3522f42f53efc20d592dd98d112aa

  • SHA1

    e7599da1e870744d6ac71cbf014bc786594c85c7

  • SHA256

    038959745351306c0527ae0441f92feea12847a98e0bb01507fcbb406bb457a2

  • SHA512

    6202b31aa671b5b3a62d5f262710ffb24af80c71051f6584e253656b06849aaa7016a1b3e677cd6db42b356cf99bf0f043cc34a029a57591a44fef06c3d299c1

  • SSDEEP

    196608:ZsT4kBNSrVpR/AFScn8XzKDvVtWMzDvrQ:6NBNE/c8Xz0vSqrQ

Malware Config

Targets

    • Target

      7cb3522f42f53efc20d592dd98d112aa.apk

    • Size

      6.2MB

    • MD5

      7cb3522f42f53efc20d592dd98d112aa

    • SHA1

      e7599da1e870744d6ac71cbf014bc786594c85c7

    • SHA256

      038959745351306c0527ae0441f92feea12847a98e0bb01507fcbb406bb457a2

    • SHA512

      6202b31aa671b5b3a62d5f262710ffb24af80c71051f6584e253656b06849aaa7016a1b3e677cd6db42b356cf99bf0f043cc34a029a57591a44fef06c3d299c1

    • SSDEEP

      196608:ZsT4kBNSrVpR/AFScn8XzKDvVtWMzDvrQ:6NBNE/c8Xz0vSqrQ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks