General

  • Target

    b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1

  • Size

    83.2MB

  • Sample

    240819-w6ck6szalc

  • MD5

    878a54d1ef12aa574bf1e2ac68a61d29

  • SHA1

    c61fc2f7755f85b6d241ec9a85f40e4a3f995568

  • SHA256

    b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1

  • SHA512

    96f914406d452cce346d9a390b55d00c9d44e250ca13beae66e0ba7b34829772c0186708ebac05d5db13f01d1d0c54e1be7ddf6f5569cf64b8ef992a221b496b

  • SSDEEP

    1572864:WekFHxdlDZyIiAIbp3WX3GM80lzV/lldUYBFUW5ukbh:OHxdTW30VPldUYBFVl

Malware Config

Targets

    • Target

      b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1

    • Size

      83.2MB

    • MD5

      878a54d1ef12aa574bf1e2ac68a61d29

    • SHA1

      c61fc2f7755f85b6d241ec9a85f40e4a3f995568

    • SHA256

      b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1

    • SHA512

      96f914406d452cce346d9a390b55d00c9d44e250ca13beae66e0ba7b34829772c0186708ebac05d5db13f01d1d0c54e1be7ddf6f5569cf64b8ef992a221b496b

    • SSDEEP

      1572864:WekFHxdlDZyIiAIbp3WX3GM80lzV/lldUYBFUW5ukbh:OHxdTW30VPldUYBFVl

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks