General

  • Target

    5562ad721d4409b50354dcd13036b9d63302031d3b00bb8d808d7d7964d049ef.bin

  • Size

    4.5MB

  • Sample

    240802-1xsy1sscmj

  • MD5

    80510f9962a9ac0d3095e4ba5bb78861

  • SHA1

    a8a3fb36f611759d92a707018e4cb9942fc9db8a

  • SHA256

    5562ad721d4409b50354dcd13036b9d63302031d3b00bb8d808d7d7964d049ef

  • SHA512

    df1c4e3dff8435e92a642555d8f1f83280e14491f589fcd18ce606adfa12db38c6aa4b0135d377f195061de3b112bff96b5057b23cb297488abbfafc717acb3d

  • SSDEEP

    98304:nXrlIdC2L2ZFCoTwrdiTjUZQCZI2qTcykqgvTCdAk6LaZAC1:ZMC2L2ZFvXutSZg5/m36LA91

Malware Config

Targets

    • Target

      5562ad721d4409b50354dcd13036b9d63302031d3b00bb8d808d7d7964d049ef.bin

    • Size

      4.5MB

    • MD5

      80510f9962a9ac0d3095e4ba5bb78861

    • SHA1

      a8a3fb36f611759d92a707018e4cb9942fc9db8a

    • SHA256

      5562ad721d4409b50354dcd13036b9d63302031d3b00bb8d808d7d7964d049ef

    • SHA512

      df1c4e3dff8435e92a642555d8f1f83280e14491f589fcd18ce606adfa12db38c6aa4b0135d377f195061de3b112bff96b5057b23cb297488abbfafc717acb3d

    • SSDEEP

      98304:nXrlIdC2L2ZFCoTwrdiTjUZQCZI2qTcykqgvTCdAk6LaZAC1:ZMC2L2ZFvXutSZg5/m36LA91

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Aborts a broadcast (usually for hiding system events from other apps)

MITRE ATT&CK Mobile v15

Tasks