General

  • Target

    PelisMax1102.apk

  • Size

    54.8MB

  • Sample

    240823-a35lwsyfln

  • MD5

    d8e86bda666f958cf2048a366c70eb12

  • SHA1

    ef518dff3fdc5d46d8be26c22c9c0a759d338556

  • SHA256

    2a082a251186f073265791338799ad0e1eec0c3f4fd3b8a911bc5ec34538cf9a

  • SHA512

    6b8b6b1119e082a4dc6b981287b4d53dd2570011a072b46790a008a0b6417b5393a89813ff70b129ec1c452d90c465fb7de3c8ca3db75e3a728e65337d4bc0b9

  • SSDEEP

    786432:ts6B1FnNxWDKGvQm/1uYD5bi1b84H7UpbFlds6lOQ8is3iycHF0To3FHVYcJJXIN:i6BvnNkD0dYdilsbdI3VcmTo3ccJVIN

Malware Config

Targets

    • Target

      PelisMax1102.apk

    • Size

      54.8MB

    • MD5

      d8e86bda666f958cf2048a366c70eb12

    • SHA1

      ef518dff3fdc5d46d8be26c22c9c0a759d338556

    • SHA256

      2a082a251186f073265791338799ad0e1eec0c3f4fd3b8a911bc5ec34538cf9a

    • SHA512

      6b8b6b1119e082a4dc6b981287b4d53dd2570011a072b46790a008a0b6417b5393a89813ff70b129ec1c452d90c465fb7de3c8ca3db75e3a728e65337d4bc0b9

    • SSDEEP

      786432:ts6B1FnNxWDKGvQm/1uYD5bi1b84H7UpbFlds6lOQ8is3iycHF0To3FHVYcJJXIN:i6BvnNkD0dYdilsbdI3VcmTo3ccJVIN

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks