General

  • Target

    nm-mod-asphalt-nitro-1-7-9a-17901.apk

  • Size

    51.8MB

  • Sample

    240821-c1n78swcne

  • MD5

    4e4f4c9f4350fdca30afd3dca70344c4

  • SHA1

    b64facdbbf46014c1aeb3d08c742fb083f4d8363

  • SHA256

    64331cd97355c12048dc2ad30d7f09727105dcd9922fa29d67f98c47203af1b9

  • SHA512

    7c501bf6011a0c17d81f0b9085b9e8f2a9b1d7d6a92171791bb2528fb05dad6e01b0cf03bb2c1b2af34bfd3eb144679bcdb81a414b2c80e9f3ef8038ef545278

  • SSDEEP

    1572864:seDLxAyuHYikQJGmulE1WRMJLrbDGgxIERgMG6atJS2E:5a3YivAv41xIEq8atJS2E

Malware Config

Targets

    • Target

      nm-mod-asphalt-nitro-1-7-9a-17901.apk

    • Size

      51.8MB

    • MD5

      4e4f4c9f4350fdca30afd3dca70344c4

    • SHA1

      b64facdbbf46014c1aeb3d08c742fb083f4d8363

    • SHA256

      64331cd97355c12048dc2ad30d7f09727105dcd9922fa29d67f98c47203af1b9

    • SHA512

      7c501bf6011a0c17d81f0b9085b9e8f2a9b1d7d6a92171791bb2528fb05dad6e01b0cf03bb2c1b2af34bfd3eb144679bcdb81a414b2c80e9f3ef8038ef545278

    • SSDEEP

      1572864:seDLxAyuHYikQJGmulE1WRMJLrbDGgxIERgMG6atJS2E:5a3YivAv41xIEq8atJS2E

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks