General

  • Target

    c825891d4b9f37aea7a2b782c4a5da0368e58c8e9f31ed47e3da5690be91e1b8.bin

  • Size

    4.4MB

  • Sample

    240622-2sxl3sybna

  • MD5

    fde8e734fb79ea09b473dc643b70cc98

  • SHA1

    18b7e9e68ceaffa10492a15efdb03bec56ac4822

  • SHA256

    c825891d4b9f37aea7a2b782c4a5da0368e58c8e9f31ed47e3da5690be91e1b8

  • SHA512

    68582e690658f764c941bc3280949cadd457270a2800ca75c3cb7e440fb7f5d46d5d32859846d412b3f6a3066db08302de3d67ae693dd8f82d5d4a08a75a582c

  • SSDEEP

    98304:lWoCq7SEzurJZZE+mxW1f2o9oF35p0yhZqpF55rIWDgkbr7db9GTs262LoFb7b:lWoV7FurJxmxUnu3cyhZoVDdbrjmUzbn

Malware Config

Targets

    • Target

      c825891d4b9f37aea7a2b782c4a5da0368e58c8e9f31ed47e3da5690be91e1b8.bin

    • Size

      4.4MB

    • MD5

      fde8e734fb79ea09b473dc643b70cc98

    • SHA1

      18b7e9e68ceaffa10492a15efdb03bec56ac4822

    • SHA256

      c825891d4b9f37aea7a2b782c4a5da0368e58c8e9f31ed47e3da5690be91e1b8

    • SHA512

      68582e690658f764c941bc3280949cadd457270a2800ca75c3cb7e440fb7f5d46d5d32859846d412b3f6a3066db08302de3d67ae693dd8f82d5d4a08a75a582c

    • SSDEEP

      98304:lWoCq7SEzurJZZE+mxW1f2o9oF35p0yhZqpF55rIWDgkbr7db9GTs262LoFb7b:lWoV7FurJxmxUnu3cyhZoVDdbrjmUzbn

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks