General

  • Target

    6AF5B69AEC12654FD3F51D1DD3E8894810A6F6B52C57A1FED0F19A8E9C90CE57.apk

  • Size

    25.5MB

  • Sample

    240627-kh38fasbqg

  • MD5

    03681e5b7df8cce66aafade215a0d99f

  • SHA1

    8cc140a29794c9b36b41b2f1fc15058099647c67

  • SHA256

    6af5b69aec12654fd3f51d1dd3e8894810a6f6b52c57a1fed0f19a8e9c90ce57

  • SHA512

    39fca233953647293f5e0b7f479c4d3ca084e0e9bdf41c2b8edf5c0f5559920e0689480c9ba3f2a098af54aa1e8be1585bbccbf07aeca6573c24bbeeda20667e

  • SSDEEP

    786432:Jqp0q8/YmmRPy9uCBAbOGDoYDszkXABTzVikn7xGwgcO:Jw0HFmA9up9DowRXABTpiw7wV

Malware Config

Targets

    • Target

      6AF5B69AEC12654FD3F51D1DD3E8894810A6F6B52C57A1FED0F19A8E9C90CE57.apk

    • Size

      25.5MB

    • MD5

      03681e5b7df8cce66aafade215a0d99f

    • SHA1

      8cc140a29794c9b36b41b2f1fc15058099647c67

    • SHA256

      6af5b69aec12654fd3f51d1dd3e8894810a6f6b52c57a1fed0f19a8e9c90ce57

    • SHA512

      39fca233953647293f5e0b7f479c4d3ca084e0e9bdf41c2b8edf5c0f5559920e0689480c9ba3f2a098af54aa1e8be1585bbccbf07aeca6573c24bbeeda20667e

    • SSDEEP

      786432:Jqp0q8/YmmRPy9uCBAbOGDoYDszkXABTzVikn7xGwgcO:Jw0HFmA9up9DowRXABTpiw7wV

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks