General

  • Target

    dreamerland_release_237b.apk

  • Size

    220.9MB

  • Sample

    240824-fap9dstdkd

  • MD5

    16de6efef300c080a302cb41483d41bd

  • SHA1

    93d62e42c35287ed0c79b7494ae25be3bdc09306

  • SHA256

    063e9699bb32db6603ec69f83bcfa4a824840bb40dcc5a1f7ed998c15c60371d

  • SHA512

    a5563c3d1d1f9ab70dd8143ad519df32b12b1006f3fcab99b76b5bf1d200330ba507a31aec42e23e79b77c02c674f8cfd508c97bb68b32f234d6b7f6c0d22ba5

  • SSDEEP

    1572864:+lhbhaMiFXMDsyaLqbZKQaOTwybm855wdfkgWAVqw7/Ui9s9dBKUc0j4aMgnXVO1:+9DT0q1P5wd8Cqwr58mKjpMEOVGC

Malware Config

Targets

    • Target

      dreamerland_release_237b.apk

    • Size

      220.9MB

    • MD5

      16de6efef300c080a302cb41483d41bd

    • SHA1

      93d62e42c35287ed0c79b7494ae25be3bdc09306

    • SHA256

      063e9699bb32db6603ec69f83bcfa4a824840bb40dcc5a1f7ed998c15c60371d

    • SHA512

      a5563c3d1d1f9ab70dd8143ad519df32b12b1006f3fcab99b76b5bf1d200330ba507a31aec42e23e79b77c02c674f8cfd508c97bb68b32f234d6b7f6c0d22ba5

    • SSDEEP

      1572864:+lhbhaMiFXMDsyaLqbZKQaOTwybm855wdfkgWAVqw7/Ui9s9dBKUc0j4aMgnXVO1:+9DT0q1P5wd8Cqwr58mKjpMEOVGC

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks