Resubmissions

13/08/2024, 20:25

240813-y7jrzsyfrm 7

13/08/2024, 20:05

240813-ytzahsyapp 7

General

  • Target

    Battlepillars-1.2.9.5452.apk

  • Size

    49.9MB

  • Sample

    240813-y7jrzsyfrm

  • MD5

    e289f7b9ac27dc6960e5431df49edbdd

  • SHA1

    ae9ba0a3aec1446b9df7db6939915b6679f2cb34

  • SHA256

    b960e0a2bee08990da83fce711606a019c2502c0f8a44c6dafad42e5696690f4

  • SHA512

    fa79c300897a07f3965f190cd88bbfcb9a010d5a8a941768039b9ec916a429b8d16b7f23e68f7398f05e3e09c03db0f759d195ddab14661577d92a101ff31bf3

  • SSDEEP

    786432:cu2WiKQIxL7NqQVg2dpCttw+FcwVxO5R1YhqrRWQGr/yQc2paG:v2WiUlnP0U+FcwVs5RqhqVNGwcaG

Malware Config

Targets

    • Target

      Battlepillars-1.2.9.5452.apk

    • Size

      49.9MB

    • MD5

      e289f7b9ac27dc6960e5431df49edbdd

    • SHA1

      ae9ba0a3aec1446b9df7db6939915b6679f2cb34

    • SHA256

      b960e0a2bee08990da83fce711606a019c2502c0f8a44c6dafad42e5696690f4

    • SHA512

      fa79c300897a07f3965f190cd88bbfcb9a010d5a8a941768039b9ec916a429b8d16b7f23e68f7398f05e3e09c03db0f759d195ddab14661577d92a101ff31bf3

    • SSDEEP

      786432:cu2WiKQIxL7NqQVg2dpCttw+FcwVxO5R1YhqrRWQGr/yQc2paG:v2WiUlnP0U+FcwVs5RqhqVNGwcaG

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks