General

  • Target

    ipogo-13.8.apk

  • Size

    157.6MB

  • Sample

    240912-lvrwls1ekp

  • MD5

    f3867e1ed6b6ea38e1e9fc1496e9e80a

  • SHA1

    01dcdccb227240a3899fd9f0a51fb0166ea2377a

  • SHA256

    c2b4a55e048b5f6642bc66351379116d80dd33385a180061303a34fb353b07ef

  • SHA512

    ad7798cbbd90b196440f8c3ca960f7912a61b866cf3520175dab345a6903b49a036968ab5d38368c195ea2471594fc50ca3ba72d57bf984167f12dbd6ea70a3e

  • SSDEEP

    3145728:3yJ4nfOoZ7jdMQJumEtTPCPYNxNj2UMZ8tKfknj9AifSy6ulwRlRcHVLC3Gue7WE:CJ4UQJujqPYNi1oj9Aa8lWOLe7WE

Malware Config

Targets

    • Target

      ipogo-13.8.apk

    • Size

      157.6MB

    • MD5

      f3867e1ed6b6ea38e1e9fc1496e9e80a

    • SHA1

      01dcdccb227240a3899fd9f0a51fb0166ea2377a

    • SHA256

      c2b4a55e048b5f6642bc66351379116d80dd33385a180061303a34fb353b07ef

    • SHA512

      ad7798cbbd90b196440f8c3ca960f7912a61b866cf3520175dab345a6903b49a036968ab5d38368c195ea2471594fc50ca3ba72d57bf984167f12dbd6ea70a3e

    • SSDEEP

      3145728:3yJ4nfOoZ7jdMQJumEtTPCPYNxNj2UMZ8tKfknj9AifSy6ulwRlRcHVLC3Gue7WE:CJ4UQJujqPYNi1oj9Aa8lWOLe7WE

    Score
    8/10
    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks