General

  • Target

    Descargar_v1.2.3.8beta021[1].apk

  • Size

    1.7MB

  • Sample

    240727-bwj72syalp

  • MD5

    68e6fa1d57a37e43b0154dcf070a087a

  • SHA1

    5916efa5132fd0ee2c73d0854a458033be333a29

  • SHA256

    0d7d840863685b85bdfe4518ce9a4981643014853605185887d24ba5442dcf5a

  • SHA512

    fa17e1efa5ff793fc0bf1b9eeb686d11cfd443a1b12f3c90b5eb422a95fb498decf29334d75a0ad3b04753df60dcc8bb19a6cff3a4d409c632f7da4fb66ca514

  • SSDEEP

    24576:XVe/7CaCRO0rzG6Gprg6RghRZGE0z7tMMhVjt+EGQc3HBicWcEj8:XYuvfz3GPRghRIEm73hVjtUv38cvEj8

Malware Config

Targets

    • Target

      Descargar_v1.2.3.8beta021[1].apk

    • Size

      1.7MB

    • MD5

      68e6fa1d57a37e43b0154dcf070a087a

    • SHA1

      5916efa5132fd0ee2c73d0854a458033be333a29

    • SHA256

      0d7d840863685b85bdfe4518ce9a4981643014853605185887d24ba5442dcf5a

    • SHA512

      fa17e1efa5ff793fc0bf1b9eeb686d11cfd443a1b12f3c90b5eb422a95fb498decf29334d75a0ad3b04753df60dcc8bb19a6cff3a4d409c632f7da4fb66ca514

    • SSDEEP

      24576:XVe/7CaCRO0rzG6Gprg6RghRZGE0z7tMMhVjt+EGQc3HBicWcEj8:XYuvfz3GPRghRIEm73hVjtUv38cvEj8

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks