General

  • Target

    6c5423b38f9db6c439029f47401423177b6a90653029db17a813d336b4b6734f.bin

  • Size

    686KB

  • Sample

    240713-1za6zsyfrq

  • MD5

    216abfacf97c3f5010ec32c04457f844

  • SHA1

    dde2b777ad28e2f62f33608444a0863911b48607

  • SHA256

    6c5423b38f9db6c439029f47401423177b6a90653029db17a813d336b4b6734f

  • SHA512

    082e8294520cd4a1322df09cafd90569bbd0967d20e8169cb44a90219d57791626c2419da0f64a17468a0f5a7da4d5c09a40df927458ea3eb12986402ac3e3fb

  • SSDEEP

    12288:Pfgi8sMQ5qRyDCtmkOmjz/n9pwbEkwI19GjbIEVsqxg/yPBkhUu48kZt5:PfosM5RyDURj7YbvXcbqUi4hn

Malware Config

Targets

    • Target

      6c5423b38f9db6c439029f47401423177b6a90653029db17a813d336b4b6734f.bin

    • Size

      686KB

    • MD5

      216abfacf97c3f5010ec32c04457f844

    • SHA1

      dde2b777ad28e2f62f33608444a0863911b48607

    • SHA256

      6c5423b38f9db6c439029f47401423177b6a90653029db17a813d336b4b6734f

    • SHA512

      082e8294520cd4a1322df09cafd90569bbd0967d20e8169cb44a90219d57791626c2419da0f64a17468a0f5a7da4d5c09a40df927458ea3eb12986402ac3e3fb

    • SSDEEP

      12288:Pfgi8sMQ5qRyDCtmkOmjz/n9pwbEkwI19GjbIEVsqxg/yPBkhUu48kZt5:PfosM5RyDURj7YbvXcbqUi4hn

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks