General

  • Target

    a2840cf48a0f8b89710bac1441143c9b.bin

  • Size

    19.8MB

  • Sample

    240614-cp3aqavhmm

  • MD5

    a2840cf48a0f8b89710bac1441143c9b

  • SHA1

    0b8c6da2b3a7b56b88028c5acd7f574b9219c2c6

  • SHA256

    53c96ae9d703dbd4a7d7bd0222276abdf2eec489b30798b248e9830a55f9b8c1

  • SHA512

    b69131712bcdca64cea4f22e175d41af97e3b833f9d57fe38f160736e2574457c3fe3bf1f99cf6375ddc726d3caea14e4ed20a02e282828fbab1a1fd74a3fe60

  • SSDEEP

    393216:jrfrWGJMcs1+q/TfS9Ra3NZTZN7tN38HW+ftQZ5+a8ujMTzTuzy6:/fr7MB+qqza3nZNJd8HW+1fuwTX0J

Malware Config

Targets

    • Target

      a2840cf48a0f8b89710bac1441143c9b.bin

    • Size

      19.8MB

    • MD5

      a2840cf48a0f8b89710bac1441143c9b

    • SHA1

      0b8c6da2b3a7b56b88028c5acd7f574b9219c2c6

    • SHA256

      53c96ae9d703dbd4a7d7bd0222276abdf2eec489b30798b248e9830a55f9b8c1

    • SHA512

      b69131712bcdca64cea4f22e175d41af97e3b833f9d57fe38f160736e2574457c3fe3bf1f99cf6375ddc726d3caea14e4ed20a02e282828fbab1a1fd74a3fe60

    • SSDEEP

      393216:jrfrWGJMcs1+q/TfS9Ra3NZTZN7tN38HW+ftQZ5+a8ujMTzTuzy6:/fr7MB+qqza3nZNJd8HW+1fuwTX0J

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks