General

  • Target

    0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef.bin

  • Size

    241KB

  • Sample

    240715-1yta6stglh

  • MD5

    3b987a08cc29e57554d39ded4fdb3991

  • SHA1

    d0125fa186a48e64523c512319e62b7b3b9013c8

  • SHA256

    0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef

  • SHA512

    a49721761c3deb282e08c9d1aaa4670bc615017bd77a602fc39e1cee46445088e9fd368fb63dfae7cca152c2aca6398ddddc9457c37bf8b1abad486b90647587

  • SSDEEP

    6144:mVuzKUNkXkGvcqxZMbSYJ05OQNPp7FCCdXT8T2J:mszKuxGmSYi5ZNxFnNoi

Malware Config

Targets

    • Target

      0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef.bin

    • Size

      241KB

    • MD5

      3b987a08cc29e57554d39ded4fdb3991

    • SHA1

      d0125fa186a48e64523c512319e62b7b3b9013c8

    • SHA256

      0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef

    • SHA512

      a49721761c3deb282e08c9d1aaa4670bc615017bd77a602fc39e1cee46445088e9fd368fb63dfae7cca152c2aca6398ddddc9457c37bf8b1abad486b90647587

    • SSDEEP

      6144:mVuzKUNkXkGvcqxZMbSYJ05OQNPp7FCCdXT8T2J:mszKuxGmSYi5ZNxFnNoi

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Requests changing the default SMS application.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks