General

  • Target

    Crunchyroll v3.58.1 (PREMIUM).apk

  • Size

    17.3MB

  • Sample

    240828-v9aqbayard

  • MD5

    af130e5c035618cafa8398724f7f5a2f

  • SHA1

    6d2c12b2e01564b031fdd95c6df5a4010e9548c0

  • SHA256

    deb2bc28f86b83ad8bb50c87c09abbabae2df7f14e9959b9c8cd296e0551e349

  • SHA512

    5822a5afcdb7c67b57c99b7414287b049d71f144dbe646fb3261f903321dac925422aa3fc52900d6d041016e83aa3c41d61f0717609793c9d2b138f7e5df50c2

  • SSDEEP

    196608:jkahSmZ7tMmZixfNcNwek5+I+YnOMYWLUJrjGkKilmiNVA5r9XN/u7fz:jkahSKnZevh+frH/lJc5r9dC

Malware Config

Targets

    • Target

      Crunchyroll v3.58.1 (PREMIUM).apk

    • Size

      17.3MB

    • MD5

      af130e5c035618cafa8398724f7f5a2f

    • SHA1

      6d2c12b2e01564b031fdd95c6df5a4010e9548c0

    • SHA256

      deb2bc28f86b83ad8bb50c87c09abbabae2df7f14e9959b9c8cd296e0551e349

    • SHA512

      5822a5afcdb7c67b57c99b7414287b049d71f144dbe646fb3261f903321dac925422aa3fc52900d6d041016e83aa3c41d61f0717609793c9d2b138f7e5df50c2

    • SSDEEP

      196608:jkahSmZ7tMmZixfNcNwek5+I+YnOMYWLUJrjGkKilmiNVA5r9XN/u7fz:jkahSKnZevh+frH/lJc5r9dC

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks