Resubmissions

16-07-2024 11:28

240716-nlhbxszgkj 8

16-07-2024 11:22

240716-ngt5xszemk 8

16-07-2024 11:17

240716-ndvmaazcrl 8

16-07-2024 11:02

240716-m475maygrq 8

16-07-2024 11:01

240716-m4q64ssapc 8

16-07-2024 10:53

240716-mzemhs1gre 8

General

  • Target

    uber-4-534-10000.apk

  • Size

    158.3MB

  • Sample

    240716-nlhbxszgkj

  • MD5

    38d64104194614fabbe4cdae4965f7df

  • SHA1

    07eb655bbc67083b66f1001efee2e28e78ff7bc4

  • SHA256

    779bf902c097803471d7181df4fc89e901011ff93d264bb219c9ae8be12f1135

  • SHA512

    206c9b533d1723b74d10ccb05ad35d00046883ab5c8c733d0746383caf766ba7219e1e088730aa16fd82abb9b7414d1cdf6da0ea8397d3cf42f3941da97de054

  • SSDEEP

    3145728:QfOKs+j3QkFFHC398KM1QugL7hoCjQ/UitWIsvKm:HKsO43+V1EnCsym

Malware Config

Targets

    • Target

      uber-4-534-10000.apk

    • Size

      158.3MB

    • MD5

      38d64104194614fabbe4cdae4965f7df

    • SHA1

      07eb655bbc67083b66f1001efee2e28e78ff7bc4

    • SHA256

      779bf902c097803471d7181df4fc89e901011ff93d264bb219c9ae8be12f1135

    • SHA512

      206c9b533d1723b74d10ccb05ad35d00046883ab5c8c733d0746383caf766ba7219e1e088730aa16fd82abb9b7414d1cdf6da0ea8397d3cf42f3941da97de054

    • SSDEEP

      3145728:QfOKs+j3QkFFHC398KM1QugL7hoCjQ/UitWIsvKm:HKsO43+V1EnCsym

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks