General

  • Target

    OneShade Pro v18.5.6 - espacioapk.com.apk

  • Size

    14.6MB

  • Sample

    240817-s1xsdawclj

  • MD5

    0e85086f0ecee503391b56df9ab65554

  • SHA1

    d8bfc87552b4e8e44781b07a43e1547cfa3775a4

  • SHA256

    d4fc2501c2d06b22d2f0c466c44ddb43ff4d5d2220aac66cc79d173c25e2f1b5

  • SHA512

    9bed04acb375a13a62275a1cc19e6e23ec0c81a04f913ae826c30dd4409b4f4c62bb8b4833930c8be3d8aa19c6ef5f177ed924edcd1df5dc0bd244f87601e085

  • SSDEEP

    393216:dfcu9W9f0lptksYjQho+FgRiPLTHGrNU4u:VxWA6sYySRYmrq

Malware Config

Targets

    • Target

      OneShade Pro v18.5.6 - espacioapk.com.apk

    • Size

      14.6MB

    • MD5

      0e85086f0ecee503391b56df9ab65554

    • SHA1

      d8bfc87552b4e8e44781b07a43e1547cfa3775a4

    • SHA256

      d4fc2501c2d06b22d2f0c466c44ddb43ff4d5d2220aac66cc79d173c25e2f1b5

    • SHA512

      9bed04acb375a13a62275a1cc19e6e23ec0c81a04f913ae826c30dd4409b4f4c62bb8b4833930c8be3d8aa19c6ef5f177ed924edcd1df5dc0bd244f87601e085

    • SSDEEP

      393216:dfcu9W9f0lptksYjQho+FgRiPLTHGrNU4u:VxWA6sYySRYmrq

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks