General

  • Target

    6C16F74852ACDA35F9F23AE1E8B403FD4346CAB780AA87648245F1EBE6748782.apk

  • Size

    6.7MB

  • Sample

    240627-kgkdyavaqq

  • MD5

    7b246583c74aa63c13b1e4d4d4ad718e

  • SHA1

    6cc9aa1ff041fb7162debcff2dc3787bdb6707b2

  • SHA256

    6c16f74852acda35f9f23ae1e8b403fd4346cab780aa87648245f1ebe6748782

  • SHA512

    925401adad913d31a044a7d5a292de823467e61b0786bc82d74967d6948d1e5132168422994389e781d6763b3a6e27ea79c86d08f8e65a3b9fe1904ac6ccac84

  • SSDEEP

    196608:2P9yuY7CuJFbNQxe4HgP+XL23Gwt8SWKE9xSMPY1uuGh:sytCuiM4Hn9SlE9oMABGh

Malware Config

Targets

    • Target

      6C16F74852ACDA35F9F23AE1E8B403FD4346CAB780AA87648245F1EBE6748782.apk

    • Size

      6.7MB

    • MD5

      7b246583c74aa63c13b1e4d4d4ad718e

    • SHA1

      6cc9aa1ff041fb7162debcff2dc3787bdb6707b2

    • SHA256

      6c16f74852acda35f9f23ae1e8b403fd4346cab780aa87648245f1ebe6748782

    • SHA512

      925401adad913d31a044a7d5a292de823467e61b0786bc82d74967d6948d1e5132168422994389e781d6763b3a6e27ea79c86d08f8e65a3b9fe1904ac6ccac84

    • SSDEEP

      196608:2P9yuY7CuJFbNQxe4HgP+XL23Gwt8SWKE9xSMPY1uuGh:sytCuiM4Hn9SlE9oMABGh

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks