General

  • Target

    free-fire-max-2.105.1-apkmodget.com.apk

  • Size

    80.3MB

  • Sample

    240805-pt2afazdrc

  • MD5

    11cf936bab7d0becfa73e0de1b206b3c

  • SHA1

    bf4922df25e5465fdfe0a599746104731ccd97d3

  • SHA256

    3aa5b7aec80f1b52e2444c048103198c9ec5da3da90c798dad26a22aa850efc6

  • SHA512

    edceec49d83c7693a02b17ab7d33ab636a5b31c0478290c3569407148317b33d6ba6721c27b6731484d96cc48565bbd650688af1b7f610001877ff763897920d

  • SSDEEP

    1572864:bcBtC1ENU4gnfmmH7ZVGCzKMrYvUJwI+P5pjK2SFIUTWMVeWc8:bcBEv4g+gdVPJrRJxo5kvFIaVeWp

Malware Config

Targets

    • Target

      free-fire-max-2.105.1-apkmodget.com.apk

    • Size

      80.3MB

    • MD5

      11cf936bab7d0becfa73e0de1b206b3c

    • SHA1

      bf4922df25e5465fdfe0a599746104731ccd97d3

    • SHA256

      3aa5b7aec80f1b52e2444c048103198c9ec5da3da90c798dad26a22aa850efc6

    • SHA512

      edceec49d83c7693a02b17ab7d33ab636a5b31c0478290c3569407148317b33d6ba6721c27b6731484d96cc48565bbd650688af1b7f610001877ff763897920d

    • SSDEEP

      1572864:bcBtC1ENU4gnfmmH7ZVGCzKMrYvUJwI+P5pjK2SFIUTWMVeWc8:bcBEv4g+gdVPJrRJxo5kvFIaVeWp

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the content of photos stored on the user's device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks