General

  • Target

    7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8

  • Size

    21.4MB

  • Sample

    240908-ajrwpawaqa

  • MD5

    b9670781a6220f5db33c9dbd6c25238d

  • SHA1

    d7b5125f47ffadc06b6e27ea900fa0dfa1f1cc6b

  • SHA256

    7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8

  • SHA512

    a18f1c5b326b8bab3df03a474e77c27414aea61e04f123651e4d1981bce1a39619f9954190b70ac1ac7eecffb09fbe60083c061b3bc66811890dc6582382a993

  • SSDEEP

    393216:KD51hYo9wYYoIPH9Sg/2BUozTNR4pgka1SiDded0vQ5ofh5B:KF1h3aY/IPdSg/2BUozzSicd0vQ5M5B

Malware Config

Targets

    • Target

      7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8

    • Size

      21.4MB

    • MD5

      b9670781a6220f5db33c9dbd6c25238d

    • SHA1

      d7b5125f47ffadc06b6e27ea900fa0dfa1f1cc6b

    • SHA256

      7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8

    • SHA512

      a18f1c5b326b8bab3df03a474e77c27414aea61e04f123651e4d1981bce1a39619f9954190b70ac1ac7eecffb09fbe60083c061b3bc66811890dc6582382a993

    • SSDEEP

      393216:KD51hYo9wYYoIPH9Sg/2BUozTNR4pgka1SiDded0vQ5ofh5B:KF1h3aY/IPdSg/2BUozzSicd0vQ5M5B

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks