General

  • Target

    SPORTSFIRE_2.0.3_APKPure.apk

  • Size

    14.4MB

  • Sample

    240616-2rs79ssape

  • MD5

    1b27cbbc9b290e05524898395544d5f2

  • SHA1

    4359a27739a367295c658e3fa95454dff65d1894

  • SHA256

    fc8024d09dfa4ea34b7342b61027deae7c6f89a38af129c3794dd7f64ef47c34

  • SHA512

    6020db97e2c3292e6d69ca01aa15e11e9c54d3c0d745f67030932ba8f663098759d4792dbecca0b53d2cdeabac9597c1ee19e4983ee4deda9769b6744c5cdde0

  • SSDEEP

    393216:YJcTUCAmKU643GzovYHs+PbL+sWT3XJ1oIQ3IZ:/TUCAz+GE09PDWbJhCIZ

Malware Config

Targets

    • Target

      SPORTSFIRE_2.0.3_APKPure.apk

    • Size

      14.4MB

    • MD5

      1b27cbbc9b290e05524898395544d5f2

    • SHA1

      4359a27739a367295c658e3fa95454dff65d1894

    • SHA256

      fc8024d09dfa4ea34b7342b61027deae7c6f89a38af129c3794dd7f64ef47c34

    • SHA512

      6020db97e2c3292e6d69ca01aa15e11e9c54d3c0d745f67030932ba8f663098759d4792dbecca0b53d2cdeabac9597c1ee19e4983ee4deda9769b6744c5cdde0

    • SSDEEP

      393216:YJcTUCAmKU643GzovYHs+PbL+sWT3XJ1oIQ3IZ:/TUCAz+GE09PDWbJhCIZ

    • Checks if the Android device is rooted.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks