General

  • Target

    ccleaner-24-13-0.apk

  • Size

    42.8MB

  • Sample

    240901-qkwt2a1gqq

  • MD5

    17160244d75580862ba6e7a477c5a05f

  • SHA1

    79f31ce482574a8d59c2ca86bc6d87e9f410ba8f

  • SHA256

    a43a53931929286763e2c3b49e1e54d2aa9146c8eab160353f9a84bc1e9544ed

  • SHA512

    10e6463e700e05cb144a183db9bcac05656ba20a740641ef7d0008355c39f4fa9b33dc17bef94bc675ab99d257ad8b5e0d629aa284e0319b28183907b51afa03

  • SSDEEP

    393216:YM21Wn48weVNrtpkQylH4zu3u8AsSW73QZlHuw2Ef20NN0RXwrGye:6+9wMNTny1Eu+88W7cHuG0RArm

Malware Config

Targets

    • Target

      ccleaner-24-13-0.apk

    • Size

      42.8MB

    • MD5

      17160244d75580862ba6e7a477c5a05f

    • SHA1

      79f31ce482574a8d59c2ca86bc6d87e9f410ba8f

    • SHA256

      a43a53931929286763e2c3b49e1e54d2aa9146c8eab160353f9a84bc1e9544ed

    • SHA512

      10e6463e700e05cb144a183db9bcac05656ba20a740641ef7d0008355c39f4fa9b33dc17bef94bc675ab99d257ad8b5e0d629aa284e0319b28183907b51afa03

    • SSDEEP

      393216:YM21Wn48weVNrtpkQylH4zu3u8AsSW73QZlHuw2Ef20NN0RXwrGye:6+9wMNTny1Eu+88W7cHuG0RArm

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks