General
-
Target
8E938A6DF781CFC56FCACFAF6655861BF21670E40ED2F70C0785A68181265985.apk
-
Size
19.5MB
-
Sample
240627-kdez2stgmj
-
MD5
ddcc5379175112b6fb9a03f33290bf0d
-
SHA1
5018aab45c1ec8aedbff614b3e3a04557b58e9b0
-
SHA256
8e938a6df781cfc56fcacfaf6655861bf21670e40ed2f70c0785a68181265985
-
SHA512
76694ba8348f40ffce801e49948aed36d6a7719cc64467d98421fc209443d09bf5b21877af3e9ff98b1b707537ce23638c15f0e694826d3495adf003a1aa2081
-
SSDEEP
393216:4u9prh8wHUBkzmu3exVPNzpUDTnChrgEX4e4PnaMmpH9gEXPe41qaETqTg4:Bh8AEfRETnQjoe0nBm7jfe4vEud
Static task
static1
Behavioral task
behavioral1
Sample
8E938A6DF781CFC56FCACFAF6655861BF21670E40ED2F70C0785A68181265985.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
8E938A6DF781CFC56FCACFAF6655861BF21670E40ED2F70C0785A68181265985.apk
-
Size
19.5MB
-
MD5
ddcc5379175112b6fb9a03f33290bf0d
-
SHA1
5018aab45c1ec8aedbff614b3e3a04557b58e9b0
-
SHA256
8e938a6df781cfc56fcacfaf6655861bf21670e40ed2f70c0785a68181265985
-
SHA512
76694ba8348f40ffce801e49948aed36d6a7719cc64467d98421fc209443d09bf5b21877af3e9ff98b1b707537ce23638c15f0e694826d3495adf003a1aa2081
-
SSDEEP
393216:4u9prh8wHUBkzmu3exVPNzpUDTnChrgEX4e4PnaMmpH9gEXPe41qaETqTg4:Bh8AEfRETnQjoe0nBm7jfe4vEud
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2