General

  • Target

    a289fe558ee5649f7a2e535d960506fc.bin

  • Size

    16.0MB

  • Sample

    240614-cvr2yasanh

  • MD5

    a289fe558ee5649f7a2e535d960506fc

  • SHA1

    4180a812bde4a9b4cc0a60d69bb3e13d15249f1f

  • SHA256

    8ce30a6760c700766e394f9467f6a47bcac28d195d58ca04a16acc946b879934

  • SHA512

    2ea9b6d245d0c0e4e0949fb8b58f549115557ca9b930fcdd6fa041048173d30622e8ea1a85a464c42f054b2cb1b92c63b0e6e4160872b09ccb4cc7262850f909

  • SSDEEP

    393216:674F7blRD7vvNmsgvp23OoHjptAqYoHjXQAqD16fIIBMFrcFIR:JBRltemPYYkD14rhFIR

Malware Config

Targets

    • Target

      a289fe558ee5649f7a2e535d960506fc.bin

    • Size

      16.0MB

    • MD5

      a289fe558ee5649f7a2e535d960506fc

    • SHA1

      4180a812bde4a9b4cc0a60d69bb3e13d15249f1f

    • SHA256

      8ce30a6760c700766e394f9467f6a47bcac28d195d58ca04a16acc946b879934

    • SHA512

      2ea9b6d245d0c0e4e0949fb8b58f549115557ca9b930fcdd6fa041048173d30622e8ea1a85a464c42f054b2cb1b92c63b0e6e4160872b09ccb4cc7262850f909

    • SSDEEP

      393216:674F7blRD7vvNmsgvp23OoHjptAqYoHjXQAqD16fIIBMFrcFIR:JBRltemPYYkD14rhFIR

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks