General

  • Target

    a1647fd5225a321a2fd16e3a08cc2b4bfed6e645ccc1ab3d854d5ecd9bc3b633.apk

  • Size

    11.9MB

  • Sample

    240816-bpad9sxard

  • MD5

    f2cc29dad8d228009d8ba0427e80d862

  • SHA1

    67833d6b9da1dadd22e523ecd7057e52fa8dcdd0

  • SHA256

    a1647fd5225a321a2fd16e3a08cc2b4bfed6e645ccc1ab3d854d5ecd9bc3b633

  • SHA512

    7e6d3c37672c23cd3512fb951e3c184aebf5e6ea99eaafaf6f33731f9dafd9fa953556fd453b2abd5a5a368ba999d30e3fcd1aa952fc48670a8fd38c480c1d51

  • SSDEEP

    196608:BV1DluXHrLs5k01rFQRRwanrEheTOFoxSMh6D/OkuJ0Dt0L+4zFzSvu4+9Coq12N:BLDoXLLs57rFUyeqFQ9eOkuJQtuh5F4C

Malware Config

Targets

    • Target

      a1647fd5225a321a2fd16e3a08cc2b4bfed6e645ccc1ab3d854d5ecd9bc3b633.apk

    • Size

      11.9MB

    • MD5

      f2cc29dad8d228009d8ba0427e80d862

    • SHA1

      67833d6b9da1dadd22e523ecd7057e52fa8dcdd0

    • SHA256

      a1647fd5225a321a2fd16e3a08cc2b4bfed6e645ccc1ab3d854d5ecd9bc3b633

    • SHA512

      7e6d3c37672c23cd3512fb951e3c184aebf5e6ea99eaafaf6f33731f9dafd9fa953556fd453b2abd5a5a368ba999d30e3fcd1aa952fc48670a8fd38c480c1d51

    • SSDEEP

      196608:BV1DluXHrLs5k01rFQRRwanrEheTOFoxSMh6D/OkuJ0Dt0L+4zFzSvu4+9Coq12N:BLDoXLLs57rFUyeqFQ9eOkuJQtuh5F4C

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks