General

  • Target

    Android.VikingHorde.zip

  • Size

    6.2MB

  • Sample

    240629-ynnxlayajn

  • MD5

    2b8c8f0fce97495147c93fdb2c2aa36c

  • SHA1

    e5852ca7c6e69c53ceed7fbdfba50dbcdfb8321a

  • SHA256

    983ed48bf83a01127f6eb116f541965a686ca51b137d50bfa57ee056321ff467

  • SHA512

    83a59824e78055c88379e8fb4505606e18048024cf0473f038f87c265f4513113c8aa0def425a9a9bb644c45c634fdfda0acea7bca84753b8942f030c6700fb9

  • SSDEEP

    98304:QITjOkHaup7ZeXQ2HLLAmd2Ij6+g420Wr3aRKhHWXUFxTpqX6uowu//5vQN6LLZZ:BTVaxQQX/20M9gUF+KTz/PRooiVRM

Malware Config

Targets

    • Target

      viking.apk

    • Size

      7.1MB

    • MD5

      390e66ffaccaa557a8d5c43c8f3a20a9

    • SHA1

      3bd9635325957d559ca366601922a23134789023

    • SHA256

      254c1f16c8aa4c4c033e925b629d9a74ccb76ebf76204df7807b84a593f38dc0

    • SHA512

      3fe5b688c1be6356644650cdcbe8de5e6087b2de2cae1e9a0b864d239295bca6b0f5ddaa2440c782c022fb3a83f94038e99fe9a9b09ad1eaa7e4b6c95fcd0fa0

    • SSDEEP

      98304:R+4H4gW8LYuv10Smuz0wdQdFTj7vfct2HdJLvdlSth8IgmbKWdhdVs063JPdj8+d:p3YuvJmu3eXYs9tk/2WHdKtJfqSUtufJ

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks