Resubmissions

15/09/2024, 04:51

240915-fg1cyawfpc 8

General

  • Target

    anilab-latest.apk

  • Size

    17.3MB

  • Sample

    240915-fg1cyawfpc

  • MD5

    15dd11ebf0949a950ad522eb84279a2f

  • SHA1

    9342130543bc4987cb12148fd1064f45e7df4fa0

  • SHA256

    0789c62609e473d37e99e0370a3654f06867f06bb49779bddcf450fe3b22c370

  • SHA512

    98935ada32bb59e1d74a78ffd980c70080b132a9e4e9d38988c4323ca13ed3e23a8879be61b67d3b23daea50e8d49b45ceb2705a3042d5af615bd64a16056f41

  • SSDEEP

    196608:st7kvKs34iHv92yNr1+7XPLxxjGkKilmiNEbNcDnD+YnOMYkAkmGF:sBkSpe2+r1+LV/lJyWCr9A

Malware Config

Targets

    • Target

      anilab-latest.apk

    • Size

      17.3MB

    • MD5

      15dd11ebf0949a950ad522eb84279a2f

    • SHA1

      9342130543bc4987cb12148fd1064f45e7df4fa0

    • SHA256

      0789c62609e473d37e99e0370a3654f06867f06bb49779bddcf450fe3b22c370

    • SHA512

      98935ada32bb59e1d74a78ffd980c70080b132a9e4e9d38988c4323ca13ed3e23a8879be61b67d3b23daea50e8d49b45ceb2705a3042d5af615bd64a16056f41

    • SSDEEP

      196608:st7kvKs34iHv92yNr1+7XPLxxjGkKilmiNEbNcDnD+YnOMYkAkmGF:sBkSpe2+r1+LV/lJyWCr9A

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks