General
-
Target
0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef.bin
-
Size
241KB
-
Sample
240715-1yta6stglh
-
MD5
3b987a08cc29e57554d39ded4fdb3991
-
SHA1
d0125fa186a48e64523c512319e62b7b3b9013c8
-
SHA256
0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef
-
SHA512
a49721761c3deb282e08c9d1aaa4670bc615017bd77a602fc39e1cee46445088e9fd368fb63dfae7cca152c2aca6398ddddc9457c37bf8b1abad486b90647587
-
SSDEEP
6144:mVuzKUNkXkGvcqxZMbSYJ05OQNPp7FCCdXT8T2J:mszKuxGmSYi5ZNxFnNoi
Static task
static1
Behavioral task
behavioral1
Sample
0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef.bin
-
Size
241KB
-
MD5
3b987a08cc29e57554d39ded4fdb3991
-
SHA1
d0125fa186a48e64523c512319e62b7b3b9013c8
-
SHA256
0956d40fa0656719da3b6e6512bafff3a0e099099cd388da75483c022ead70ef
-
SHA512
a49721761c3deb282e08c9d1aaa4670bc615017bd77a602fc39e1cee46445088e9fd368fb63dfae7cca152c2aca6398ddddc9457c37bf8b1abad486b90647587
-
SSDEEP
6144:mVuzKUNkXkGvcqxZMbSYJ05OQNPp7FCCdXT8T2J:mszKuxGmSYi5ZNxFnNoi
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Requests changing the default SMS application.
-
Tries to add a device administrator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1