General

  • Target

    zlibrary-app-latest.apk

  • Size

    31.5MB

  • Sample

    240726-3wwdvssgjq

  • MD5

    3d46adfd3550c95950458a4e85e893d4

  • SHA1

    bcd75ef38aa5a13038f5c2f469f298de6517a933

  • SHA256

    bc312fdf8238e23a984fd1e072b1b83632828a7c3912de0a758cbbae798b5009

  • SHA512

    1fb0bc5ab44112c660a08a84f6be611f20f5e135c6c0c43c2afde9f11073c47443e96afa0abbb76fb2f6456eedcd30e83ae4f41f01c58bd964e02f299bd4a186

  • SSDEEP

    786432:XHt3EmyGwIv9/xZljhHtKAxH0MKm85Fut3bRajyTlOKKRMSA:XHt3EXGwQ9/56rM78ayjy5O72SA

Malware Config

Targets

    • Target

      zlibrary-app-latest.apk

    • Size

      31.5MB

    • MD5

      3d46adfd3550c95950458a4e85e893d4

    • SHA1

      bcd75ef38aa5a13038f5c2f469f298de6517a933

    • SHA256

      bc312fdf8238e23a984fd1e072b1b83632828a7c3912de0a758cbbae798b5009

    • SHA512

      1fb0bc5ab44112c660a08a84f6be611f20f5e135c6c0c43c2afde9f11073c47443e96afa0abbb76fb2f6456eedcd30e83ae4f41f01c58bd964e02f299bd4a186

    • SSDEEP

      786432:XHt3EmyGwIv9/xZljhHtKAxH0MKm85Fut3bRajyTlOKKRMSA:XHt3EXGwQ9/56rM78ayjy5O72SA

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks