General

  • Target

    697862c4f8519f47baf13c9605b35a78100028dc84932f2597dea124f6de03b6.bin

  • Size

    2.9MB

  • Sample

    240616-3dy22axdpq

  • MD5

    d1cae44b5c212da7cc1f1c242a99fb1d

  • SHA1

    2c3484d2bf6f47d12c1b24f594c258b6c716be1f

  • SHA256

    697862c4f8519f47baf13c9605b35a78100028dc84932f2597dea124f6de03b6

  • SHA512

    5fca0f24e06e839c459631c110a6cb81493f10c98a0b82b1c3f304169048ed20532242f29cd4a8a108c23ada7cef6eb58fef01cf0489000bc656e7b3fde4cc9e

  • SSDEEP

    49152:brhe8fmY8wiKyh69uEL6PtVtUoD7a4+CkIEWPYuVnyMvpHC71u0gt+c31/LKH6uo:pe8fBGKyALYtDUoD7a2kLyYsyl2+c31J

Malware Config

Targets

    • Target

      697862c4f8519f47baf13c9605b35a78100028dc84932f2597dea124f6de03b6.bin

    • Size

      2.9MB

    • MD5

      d1cae44b5c212da7cc1f1c242a99fb1d

    • SHA1

      2c3484d2bf6f47d12c1b24f594c258b6c716be1f

    • SHA256

      697862c4f8519f47baf13c9605b35a78100028dc84932f2597dea124f6de03b6

    • SHA512

      5fca0f24e06e839c459631c110a6cb81493f10c98a0b82b1c3f304169048ed20532242f29cd4a8a108c23ada7cef6eb58fef01cf0489000bc656e7b3fde4cc9e

    • SSDEEP

      49152:brhe8fmY8wiKyh69uEL6PtVtUoD7a4+CkIEWPYuVnyMvpHC71u0gt+c31/LKH6uo:pe8fBGKyALYtDUoD7a2kLyYsyl2+c31J

    • Checks if the Android device is rooted.

    • Legitimate hosting services abused for malware hosting/C2

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks