General

  • Target

    7db89b7e27a63e209b3c396626a627bdc67ed5104a73be96b9fc6e559eb6ce84.apk

  • Size

    6.8MB

  • Sample

    240802-cfn2qsygrl

  • MD5

    1e64eff544bffee632f02830a8b176bd

  • SHA1

    6820b9ce37c29871ef50c28d0790ee2c57df82cd

  • SHA256

    7db89b7e27a63e209b3c396626a627bdc67ed5104a73be96b9fc6e559eb6ce84

  • SHA512

    36b932abea2a0826f873d67835db78afc8d3d9d446ac285f69d2e2aba05ec5d28cafaeae3f870e57eac965c49b9b3e8a2136a299a4b5f3be84283cd0581614b9

  • SSDEEP

    196608:4Kk+Ibp3avNs0Ki0LsehuOFv+rxK8w3Te16nU46xKBB:ar38Ns0YLXVFvCxw3y16nh

Malware Config

Targets

    • Target

      7db89b7e27a63e209b3c396626a627bdc67ed5104a73be96b9fc6e559eb6ce84.apk

    • Size

      6.8MB

    • MD5

      1e64eff544bffee632f02830a8b176bd

    • SHA1

      6820b9ce37c29871ef50c28d0790ee2c57df82cd

    • SHA256

      7db89b7e27a63e209b3c396626a627bdc67ed5104a73be96b9fc6e559eb6ce84

    • SHA512

      36b932abea2a0826f873d67835db78afc8d3d9d446ac285f69d2e2aba05ec5d28cafaeae3f870e57eac965c49b9b3e8a2136a299a4b5f3be84283cd0581614b9

    • SSDEEP

      196608:4Kk+Ibp3avNs0Ki0LsehuOFv+rxK8w3Te16nU46xKBB:ar38Ns0YLXVFvCxw3y16nh

    • Checks if the Android device is rooted.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Declares services with permission to bind to the system

    • Queries information about active data network

    • Requests dangerous framework permissions

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks