General

  • Target

    Smart-Launcher-Premium-v6.4-build-044_build_640440-Mod.apk

  • Size

    22.1MB

  • Sample

    240822-v3wzza1gml

  • MD5

    c6d807c6732ab778ffd66ddf370bde29

  • SHA1

    e0e25086a88f67b189d465ce21e86b3117d1bdc5

  • SHA256

    38eafd9d8ddd9efc5595442f4803529e926d1f231729785bd327da470c997a58

  • SHA512

    a98a264afcd063b0e4edbd6c62ebe85123cf9c901b9d467bf40b059ec2a071e9b4443b36e5066fa98ccb29386d07bc7797268b5d091e99daeae90033b1d0cc6f

  • SSDEEP

    393216:KRHYS5oxpm9SPqV4gdjGNCvOdk6NUG1UzetqBSzYUOEVX:KR4SDSPYSk6NUG+atkG3OiX

Malware Config

Targets

    • Target

      Smart-Launcher-Premium-v6.4-build-044_build_640440-Mod.apk

    • Size

      22.1MB

    • MD5

      c6d807c6732ab778ffd66ddf370bde29

    • SHA1

      e0e25086a88f67b189d465ce21e86b3117d1bdc5

    • SHA256

      38eafd9d8ddd9efc5595442f4803529e926d1f231729785bd327da470c997a58

    • SHA512

      a98a264afcd063b0e4edbd6c62ebe85123cf9c901b9d467bf40b059ec2a071e9b4443b36e5066fa98ccb29386d07bc7797268b5d091e99daeae90033b1d0cc6f

    • SSDEEP

      393216:KRHYS5oxpm9SPqV4gdjGNCvOdk6NUG1UzetqBSzYUOEVX:KR4SDSPYSk6NUG+atkG3OiX

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks