General

  • Target

    Lucky.Patcher.v6.5.9.apk

  • Size

    5.9MB

  • Sample

    240802-zl66tszbql

  • MD5

    c463282b3519a6b93c8983f350f6e29a

  • SHA1

    a86d713d589735978dc6bac35c41c98e16e66e9f

  • SHA256

    51f8f2fb518102c0778f0f0d7eb2d9ac26f699b99b292a1db324897b9e2c61b4

  • SHA512

    ee0749b7622e929a3c15e7d45fcecee7692d073325fabbdc256d822ead2c60c7929781eab2a051d4adc5077f8b82114d593c31de62d20ff77574c4c1cc17d876

  • SSDEEP

    98304:DVxgkBmblb1ZSQKYdxu+02MiEzqbwH8wpEbNaM59Mb:DVxd41L0ViEbDp0akMb

Malware Config

Targets

    • Target

      Lucky.Patcher.v6.5.9.apk

    • Size

      5.9MB

    • MD5

      c463282b3519a6b93c8983f350f6e29a

    • SHA1

      a86d713d589735978dc6bac35c41c98e16e66e9f

    • SHA256

      51f8f2fb518102c0778f0f0d7eb2d9ac26f699b99b292a1db324897b9e2c61b4

    • SHA512

      ee0749b7622e929a3c15e7d45fcecee7692d073325fabbdc256d822ead2c60c7929781eab2a051d4adc5077f8b82114d593c31de62d20ff77574c4c1cc17d876

    • SSDEEP

      98304:DVxgkBmblb1ZSQKYdxu+02MiEzqbwH8wpEbNaM59Mb:DVxd41L0ViEbDp0akMb

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks