General

  • Target

    115.apk

  • Size

    3.5MB

  • Sample

    240726-18cfea1gph

  • MD5

    06922e1dcae1e60ee11e3cf171fab1af

  • SHA1

    1e47848601bd5c4a29e75c06112ff4f8ea0f3642

  • SHA256

    271e48ac151030d94104223cac075c577b03046f03eac29065db9ad9992f1b73

  • SHA512

    903d14bbc9e2e6332342d48d74aedeacc72f0246826678544fa475095adc9761053712c2d4647389fd0a37d479721fd71f9428199f1a6b114b353aac3c0e96ae

  • SSDEEP

    98304:/lKHsDOu0PJHkF/Lqhn2jynuzw+xrhj8y:dKHsDOZBHiGn/uzrP

Malware Config

Targets

    • Target

      115.apk

    • Size

      3.5MB

    • MD5

      06922e1dcae1e60ee11e3cf171fab1af

    • SHA1

      1e47848601bd5c4a29e75c06112ff4f8ea0f3642

    • SHA256

      271e48ac151030d94104223cac075c577b03046f03eac29065db9ad9992f1b73

    • SHA512

      903d14bbc9e2e6332342d48d74aedeacc72f0246826678544fa475095adc9761053712c2d4647389fd0a37d479721fd71f9428199f1a6b114b353aac3c0e96ae

    • SSDEEP

      98304:/lKHsDOu0PJHkF/Lqhn2jynuzw+xrhj8y:dKHsDOZBHiGn/uzrP

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks