General

  • Target

    up-mod-photomath-mod-apk-unlocked-plus-8-37-0-70000999.apk

  • Size

    15.6MB

  • Sample

    240614-j9xdjawbrn

  • MD5

    70f535aabc82bd23f7d472028e33adda

  • SHA1

    3d479c7109088cf9a53d536d319aa6e16f57716d

  • SHA256

    0c69321d6b833e073378972d4ee9c0d8acd03231fe498558cd1d066d4a116736

  • SHA512

    da2f0e54dad8574ebf3375e304427fe59b09819d181debd02838768e35d00269f8ebc88621e0201f75baa4d0a87d279ac4e309df6b30a78c17d99b6251e9913d

  • SSDEEP

    393216:BLUxlOJICBgPtjOKNwatoLb1BihsWA+Zf:BLUxlQgPtjOKN/ObpWAyf

Malware Config

Targets

    • Target

      up-mod-photomath-mod-apk-unlocked-plus-8-37-0-70000999.apk

    • Size

      15.6MB

    • MD5

      70f535aabc82bd23f7d472028e33adda

    • SHA1

      3d479c7109088cf9a53d536d319aa6e16f57716d

    • SHA256

      0c69321d6b833e073378972d4ee9c0d8acd03231fe498558cd1d066d4a116736

    • SHA512

      da2f0e54dad8574ebf3375e304427fe59b09819d181debd02838768e35d00269f8ebc88621e0201f75baa4d0a87d279ac4e309df6b30a78c17d99b6251e9913d

    • SSDEEP

      393216:BLUxlOJICBgPtjOKNwatoLb1BihsWA+Zf:BLUxlQgPtjOKN/ObpWAyf

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks