General

  • Target

    dogs 13.0.1.apk

  • Size

    240.8MB

  • Sample

    240807-2krqvsygrf

  • MD5

    47ea82ea59aa13fd7fd06dc37a49fa41

  • SHA1

    f19dfd72e35b9e9b723e512d6d68a5016e03c255

  • SHA256

    ed162a52ecdf3dd31cd864d2193b5bf65db097ea065c76ef1f76ce3138ff5b8a

  • SHA512

    d169a25ea0268e6c8d5f3f326439ddab868e9a6d7ac58f45ef48b36056b17826d6db5d454dddcbe5c8eeba2b1ca3a8805b6670ec2ac9a0d9f27fd7d87a076188

  • SSDEEP

    3145728:FTM/UAWZ0Ntp381tqVfbHurdpAG3Y4b7Niv1pWEy38:FAUAWZ0NtpcqtbOhpAoVJEB

Malware Config

Targets

    • Target

      dogs 13.0.1.apk

    • Size

      240.8MB

    • MD5

      47ea82ea59aa13fd7fd06dc37a49fa41

    • SHA1

      f19dfd72e35b9e9b723e512d6d68a5016e03c255

    • SHA256

      ed162a52ecdf3dd31cd864d2193b5bf65db097ea065c76ef1f76ce3138ff5b8a

    • SHA512

      d169a25ea0268e6c8d5f3f326439ddab868e9a6d7ac58f45ef48b36056b17826d6db5d454dddcbe5c8eeba2b1ca3a8805b6670ec2ac9a0d9f27fd7d87a076188

    • SSDEEP

      3145728:FTM/UAWZ0Ntp381tqVfbHurdpAG3Y4b7Niv1pWEy38:FAUAWZ0NtpcqtbOhpAoVJEB

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks