General

  • Target

    laucher.apk

  • Size

    4.4MB

  • Sample

    240810-yezyhayfrf

  • MD5

    f41f314ab6c125c5d83c2a2f8d07fac2

  • SHA1

    4baf349a8f525f95e2a2993950ecaf47616cc9f5

  • SHA256

    3f74294e189e58012ac438e4e446177dcc26e1b9ed581b47302b8131099134ff

  • SHA512

    ceb88faef27082c7509fc2ddbd773f23b3f5f56cae709d37e773838994aee7ed433abde29e1c89428b1b8e81fe5fdf7d561c0b1be3c989f3839a31b16b129e52

  • SSDEEP

    98304:2CnG/bGTIeoFkEU1JEhFQURiMmzJzBkTX0tY6DYKvx:2gFv1qQzcoZDx

Malware Config

Targets

    • Target

      laucher.apk

    • Size

      4.4MB

    • MD5

      f41f314ab6c125c5d83c2a2f8d07fac2

    • SHA1

      4baf349a8f525f95e2a2993950ecaf47616cc9f5

    • SHA256

      3f74294e189e58012ac438e4e446177dcc26e1b9ed581b47302b8131099134ff

    • SHA512

      ceb88faef27082c7509fc2ddbd773f23b3f5f56cae709d37e773838994aee7ed433abde29e1c89428b1b8e81fe5fdf7d561c0b1be3c989f3839a31b16b129e52

    • SSDEEP

      98304:2CnG/bGTIeoFkEU1JEhFQURiMmzJzBkTX0tY6DYKvx:2gFv1qQzcoZDx

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks