General

  • Target

    6d6774973a12cc7724a7729f6a6ab6a7ece755f7eb3c5b339a01b9de4a1cf2fe.bin

  • Size

    1.0MB

  • Sample

    240809-17cd1swcqg

  • MD5

    1e18f0bc52ba485fd1f839f670413cb9

  • SHA1

    e3aae4c17029cb71a7db2abc076e77aa0a157a53

  • SHA256

    6d6774973a12cc7724a7729f6a6ab6a7ece755f7eb3c5b339a01b9de4a1cf2fe

  • SHA512

    002574e5d3e09197a03479160f4f308857dec1f8e2f412c373c166c27e480ae478c247abaa4e9459eb0cdaf95a951e070ff40284ba869198a8a7db48e199a193

  • SSDEEP

    24576:9qA5ozZWrqvgb3NwvNHPziWGJDOND1tias3Mk13mzJLA+GvAiH:9r5UZOiG6GWKc3ias3j13mzZcA0

Malware Config

Targets

    • Target

      6d6774973a12cc7724a7729f6a6ab6a7ece755f7eb3c5b339a01b9de4a1cf2fe.bin

    • Size

      1.0MB

    • MD5

      1e18f0bc52ba485fd1f839f670413cb9

    • SHA1

      e3aae4c17029cb71a7db2abc076e77aa0a157a53

    • SHA256

      6d6774973a12cc7724a7729f6a6ab6a7ece755f7eb3c5b339a01b9de4a1cf2fe

    • SHA512

      002574e5d3e09197a03479160f4f308857dec1f8e2f412c373c166c27e480ae478c247abaa4e9459eb0cdaf95a951e070ff40284ba869198a8a7db48e199a193

    • SSDEEP

      24576:9qA5ozZWrqvgb3NwvNHPziWGJDOND1tias3Mk13mzJLA+GvAiH:9r5UZOiG6GWKc3ias3j13mzZcA0

    • Removes its main activity from the application launcher

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks