General
-
Target
ce346380cd355c68ea627047d8a88a01c0802098aa3134e5b2b3e304a084db02.bin
-
Size
703KB
-
Sample
240714-1ywfjaxckb
-
MD5
fbd30eb6bd33d0b25859f1d8560c9098
-
SHA1
fb5136d2fe916d0b84907f77e1a09a7a944d6d31
-
SHA256
ce346380cd355c68ea627047d8a88a01c0802098aa3134e5b2b3e304a084db02
-
SHA512
ecf75f79601f5b3e6cb18c8a6e318f90000ff6c038ce7bd3c27ca1b0bf69a9428a7142ba7c4e0223ebd0f811432d947c53302bdb3bfc9bb59503550a414e3d23
-
SSDEEP
12288:K0APJBOOlHYdxT5JYSmWySvUAW9x7BIhh9EmwOXHz5khPz4DieHHP:BABBOOFYFJYSmWNsAW7B8h9EmwOD5sM7
Static task
static1
Behavioral task
behavioral1
Sample
ce346380cd355c68ea627047d8a88a01c0802098aa3134e5b2b3e304a084db02.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
ce346380cd355c68ea627047d8a88a01c0802098aa3134e5b2b3e304a084db02.bin
-
Size
703KB
-
MD5
fbd30eb6bd33d0b25859f1d8560c9098
-
SHA1
fb5136d2fe916d0b84907f77e1a09a7a944d6d31
-
SHA256
ce346380cd355c68ea627047d8a88a01c0802098aa3134e5b2b3e304a084db02
-
SHA512
ecf75f79601f5b3e6cb18c8a6e318f90000ff6c038ce7bd3c27ca1b0bf69a9428a7142ba7c4e0223ebd0f811432d947c53302bdb3bfc9bb59503550a414e3d23
-
SSDEEP
12288:K0APJBOOlHYdxT5JYSmWySvUAW9x7BIhh9EmwOXHz5khPz4DieHHP:BABBOOFYFJYSmWNsAW7B8h9EmwOD5sM7
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Tries to add a device administrator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1