General

  • Target

    1c3d77e05700fce8747e1de9d952fc8566f0db1ba188841746215a20a2ba63a1.bin

  • Size

    2.7MB

  • Sample

    240615-a63ayatalb

  • MD5

    c9091b647d2444e703d9d3aa5fc43d1b

  • SHA1

    9c562f10465bda366f56dd8d4af3532246c0de98

  • SHA256

    1c3d77e05700fce8747e1de9d952fc8566f0db1ba188841746215a20a2ba63a1

  • SHA512

    f7a646ad2819dd0b0e64818034b9b1c057897f044703c9af25845daf93207a786ea7081d4d7574332efaa261bd4aa05e6d6c6cc93d2cb4fe7b5931b8fd31f4b7

  • SSDEEP

    49152:EjXLQpeYod+8cqvjN9atSJsCCrcf0+pQkwykx8XiP1U3dpO5EJz6K:EjMpho8ZMj+Iagf0+pQkwGXQ1YdpVuK

Malware Config

Targets

    • Target

      1c3d77e05700fce8747e1de9d952fc8566f0db1ba188841746215a20a2ba63a1.bin

    • Size

      2.7MB

    • MD5

      c9091b647d2444e703d9d3aa5fc43d1b

    • SHA1

      9c562f10465bda366f56dd8d4af3532246c0de98

    • SHA256

      1c3d77e05700fce8747e1de9d952fc8566f0db1ba188841746215a20a2ba63a1

    • SHA512

      f7a646ad2819dd0b0e64818034b9b1c057897f044703c9af25845daf93207a786ea7081d4d7574332efaa261bd4aa05e6d6c6cc93d2cb4fe7b5931b8fd31f4b7

    • SSDEEP

      49152:EjXLQpeYod+8cqvjN9atSJsCCrcf0+pQkwykx8XiP1U3dpO5EJz6K:EjMpho8ZMj+Iagf0+pQkwGXQ1YdpVuK

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks