General

  • Target

    D3F754CA31F768A8549747626EADB195BE4729A20C172C9824054F369AB880C3.apk

  • Size

    34.3MB

  • Sample

    240627-kkbafascrh

  • MD5

    44faaa1a382197e13c6f9e3a40a46ba8

  • SHA1

    fb4d54ead012bb067e18e5c4900618e98342867e

  • SHA256

    d3f754ca31f768a8549747626eadb195be4729a20c172c9824054f369ab880c3

  • SHA512

    0f32a4fe724b6bebb55e7d9eb2da1e8c8e8f9d557acc65943b7e5d92310ed53e03def5d3215ff36e2a976188049e2f6b5c7b580483748080f1b502117482e73f

  • SSDEEP

    393216:SCtfp2D5OmHEyYAfk1T26L5aoBx1NnS6gkwQUhhtrpt9:t9pakyNiy6AoZNnDi/

Malware Config

Targets

    • Target

      D3F754CA31F768A8549747626EADB195BE4729A20C172C9824054F369AB880C3.apk

    • Size

      34.3MB

    • MD5

      44faaa1a382197e13c6f9e3a40a46ba8

    • SHA1

      fb4d54ead012bb067e18e5c4900618e98342867e

    • SHA256

      d3f754ca31f768a8549747626eadb195be4729a20c172c9824054f369ab880c3

    • SHA512

      0f32a4fe724b6bebb55e7d9eb2da1e8c8e8f9d557acc65943b7e5d92310ed53e03def5d3215ff36e2a976188049e2f6b5c7b580483748080f1b502117482e73f

    • SSDEEP

      393216:SCtfp2D5OmHEyYAfk1T26L5aoBx1NnS6gkwQUhhtrpt9:t9pakyNiy6AoZNnDi/

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks