General

  • Target

    racing-moto-1-2-20.apk

  • Size

    8.1MB

  • Sample

    240713-xwpnestdqr

  • MD5

    331b4fe68ab91ea040c02ba8e18a6486

  • SHA1

    f659f7eddd23f24d6fb643117b0dbd86790fbba1

  • SHA256

    56e64d9351a9d4a61901daec5376b31414715c19d56dd31d43805faf59b522ee

  • SHA512

    1d9d4c0e9bf9d39e4576429df0dd76d07a479094e057313e197f7671362b6c705aeb5a3c137a040441e12ffcefcda11d1b3e05ed78e8d5e14aa17c37fefedae8

  • SSDEEP

    196608:+i8ybI4dKh5cZ0FFx66oeNWVhacdp5AD4AF:dpIuKhYo6DesHbSDTF

Malware Config

Targets

    • Target

      racing-moto-1-2-20.apk

    • Size

      8.1MB

    • MD5

      331b4fe68ab91ea040c02ba8e18a6486

    • SHA1

      f659f7eddd23f24d6fb643117b0dbd86790fbba1

    • SHA256

      56e64d9351a9d4a61901daec5376b31414715c19d56dd31d43805faf59b522ee

    • SHA512

      1d9d4c0e9bf9d39e4576429df0dd76d07a479094e057313e197f7671362b6c705aeb5a3c137a040441e12ffcefcda11d1b3e05ed78e8d5e14aa17c37fefedae8

    • SSDEEP

      196608:+i8ybI4dKh5cZ0FFx66oeNWVhacdp5AD4AF:dpIuKhYo6DesHbSDTF

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks