General

  • Target

    app-game-release.apk

  • Size

    28.0MB

  • Sample

    240825-tk4fnavajn

  • MD5

    51c256e21b7887bf60e6ff29ae6318b3

  • SHA1

    999821825c9e3c80ebdae3b5983adc24d492ab93

  • SHA256

    fe17c0b4f2513f8f7d94955bdef74fdde45c32bc9d705c1b7c63ba2a6682e2a3

  • SHA512

    98d83f5c33671920441185297c41fa8edff1df2fc97a3f66d9027d76c0b47df3240abf396a692798422a53c5359a83897bc649bb80e7a82076a4367b590e21bc

  • SSDEEP

    786432:Is/maHbBCZX/lhts9TFD3j43MJUkVVahzhAjSWxOM:IMR7B0XNhCk3CU1hVISWcM

Malware Config

Targets

    • Target

      app-game-release.apk

    • Size

      28.0MB

    • MD5

      51c256e21b7887bf60e6ff29ae6318b3

    • SHA1

      999821825c9e3c80ebdae3b5983adc24d492ab93

    • SHA256

      fe17c0b4f2513f8f7d94955bdef74fdde45c32bc9d705c1b7c63ba2a6682e2a3

    • SHA512

      98d83f5c33671920441185297c41fa8edff1df2fc97a3f66d9027d76c0b47df3240abf396a692798422a53c5359a83897bc649bb80e7a82076a4367b590e21bc

    • SSDEEP

      786432:Is/maHbBCZX/lhts9TFD3j43MJUkVVahzhAjSWxOM:IMR7B0XNhCk3CU1hVISWcM

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks