General
-
Target
up-mod-widgetable-adorable-screen-mod-apk-1-6-210-10621030.apk
-
Size
102.2MB
-
Sample
240723-tdmvbs1bpf
-
MD5
07d6d26521f59c66f02c98efe688632b
-
SHA1
4bc3bc2973a9a548bdd3a24f41728b1e0ad60502
-
SHA256
e1db52b6dfdafb1b1c614dd746e05f48bfa2b5e9a104589517564822efec6268
-
SHA512
c1a0321b1370c899c45c3ae70a86ebba8f9564a31010a255259a87c3be973b212b9f63f01aeef008206d4e8fa21d933d1bc6d467516fb517718b8d039ebb8aac
-
SSDEEP
1572864:+Xlgf4TmnYOKK8jZVHk9SRv99bBd/zInyyNxmYkSv9ZL7xEYodCTkPEBm:Ylgf4Tm3KKmy9avzlB2y0htFd7QdCTE
Static task
static1
Malware Config
Targets
-
-
Target
up-mod-widgetable-adorable-screen-mod-apk-1-6-210-10621030.apk
-
Size
102.2MB
-
MD5
07d6d26521f59c66f02c98efe688632b
-
SHA1
4bc3bc2973a9a548bdd3a24f41728b1e0ad60502
-
SHA256
e1db52b6dfdafb1b1c614dd746e05f48bfa2b5e9a104589517564822efec6268
-
SHA512
c1a0321b1370c899c45c3ae70a86ebba8f9564a31010a255259a87c3be973b212b9f63f01aeef008206d4e8fa21d933d1bc6d467516fb517718b8d039ebb8aac
-
SSDEEP
1572864:+Xlgf4TmnYOKK8jZVHk9SRv99bBd/zInyyNxmYkSv9ZL7xEYodCTkPEBm:Ylgf4Tm3KKmy9avzlB2y0htFd7QdCTE
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
5System Checks
5