General
-
Target
17783822861.zip
-
Size
50.6MB
-
Sample
240619-m398layfpc
-
MD5
f428c80b5b652c9d3061d5fa262080a0
-
SHA1
d8bc97b154badd1156d358da5d23bc9f132ffa3f
-
SHA256
07a28becedce503839138cd4cfad2a3224d2828c43e63a6eca344135cac751bb
-
SHA512
7cdbf456b4e75f1a45f31eb2ef7a0107d188f1f70afb30e036d3f59746c846fc2db087ced7a6389cc4a93e76ea4de5c905f06f313e5307472b16a35a22e5e25b
-
SSDEEP
1572864:JT+pByjOj3dAWvO5ChLnZWDyWGYSb6cP6i:JT+cTDChLZQQ+cSi
Static task
static1
Behavioral task
behavioral1
Sample
14f8c7b4b5cca8e02598309a1192d51f241ea68192c3cab5fb4ab9399d75f505.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
14f8c7b4b5cca8e02598309a1192d51f241ea68192c3cab5fb4ab9399d75f505.apk
Resource
android-33-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
14f8c7b4b5cca8e02598309a1192d51f241ea68192c3cab5fb4ab9399d75f505
-
Size
57.3MB
-
MD5
770878ad744fc0aa7f315576c3ac1246
-
SHA1
d3069d79acdb960fc79547b59cbfebb16b3892e7
-
SHA256
14f8c7b4b5cca8e02598309a1192d51f241ea68192c3cab5fb4ab9399d75f505
-
SHA512
61cbfd51ca4cb8b9724e2bc4b924f59beba6f58d249a11950d555544260ecfb8c02327c0923f2749d26c434e3bbd5edd556bff037328f1677817f6dc137dea74
-
SSDEEP
1572864:DtAhrhm//E8W9Py+qzh5CHo8aQAwrtvn6oVonLqQW3ka3bWBM:ih9Qy91qNEHda3aUqvWm
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2