General

  • Target

    bypass free.zip

  • Size

    4.5MB

  • Sample

    240823-cml6qasdpp

  • MD5

    875836e9849f774eb6674f11336413c5

  • SHA1

    d2092a97447573c18cf2e194354bd20c1e91dd63

  • SHA256

    b9b3dd3108cde440a9d8363a28ed1ea74870107fe7fdcb5a349776a911a2069d

  • SHA512

    445ec571070b78d77c6fd9be36631e7bf0c3aba9e3009c4926b25e9bae286c8d534efaabeb83ecbc3941b36e4ee82c49900afd1fa899d377ab407864d493ece0

  • SSDEEP

    98304:MxbRdH8111a7EO6h7Bu3EcaKjlLRz1QejRtoakLGp/:MxNG111aoOM1uUcaGdxZoLY

Malware Config

Targets

    • Target

      Virtual MOD_3.2.apk

    • Size

      5.1MB

    • MD5

      21b6ee6cac28641e4127d491b2070319

    • SHA1

      bf559e49322c248bc904f14fd5658c764790046d

    • SHA256

      5cbf639f9c2434de9227a412f52ffec78aa2c6f40b6d8cd913b248eb7fd96e86

    • SHA512

      8d065be940512b5afc0f09a32ffc8cd3853b1325df7644de4f045e683d9485f22a1893b2417a09a1fb3e8da82a7bcc3318a12599e2c8f8dd8de9d3f0e61b590b

    • SSDEEP

      98304:kMncVsu2KeFvFk7EO4EUMYlyHs3mddWRztQe3lbQakvY9u:kMcVsu0vFkoO4EWlylG55qvf

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Requests dangerous framework permissions

    • Target

      plugin

    • Size

      1.1MB

    • MD5

      6678be7fd6acf4426181f48b3683cd93

    • SHA1

      c186b574fea271e8e2b53736bb073e946e73affa

    • SHA256

      828f12c340feb48dfc78389a365309398279adb7e07176bac6beed788ac8338c

    • SHA512

      bf11ccfe5c7183ce747e6643b6ecb1074fe86469c9efbb023b931b398eb75efea83ae66ae3b88042f79f4d1c286ce2a6c2906b6b2ac93c71387339c2dd85dcbe

    • SSDEEP

      24576:TWCAfka65HopEFmCmYgG2t2f+H7FN70wkr9cYMy6JQvl:K9fka6qYmCmfG2ta+bFNIwkryYM7Qvl

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks