General

  • Target

    Indiaapp_MagicCash.apk

  • Size

    13.9MB

  • Sample

    240919-ezzcxs1djp

  • MD5

    fa615cefc1971d88c9dbe9c145dcf9cc

  • SHA1

    de4836b23095e979069219341e6266f2eb51c51e

  • SHA256

    df67824f169f0a7ea9c4e533587a6b5043dd024f7791396f5038a4d2ce3a7df7

  • SHA512

    491ed5ac4305179361e1002c93163bfb7afbaa5d4b1539944c9e1611e6a7cecec93338509ba6ac6cdeb5a6ae021dd0a4f8c1168ea9f18bad1e20c860ad152e44

  • SSDEEP

    393216:4/fa9mzKJHhjartAm8toAx13bvoYN7NL+u4:4im+5h1tos13bvoYN7NKu4

Malware Config

Targets

    • Target

      Indiaapp_MagicCash.apk

    • Size

      13.9MB

    • MD5

      fa615cefc1971d88c9dbe9c145dcf9cc

    • SHA1

      de4836b23095e979069219341e6266f2eb51c51e

    • SHA256

      df67824f169f0a7ea9c4e533587a6b5043dd024f7791396f5038a4d2ce3a7df7

    • SHA512

      491ed5ac4305179361e1002c93163bfb7afbaa5d4b1539944c9e1611e6a7cecec93338509ba6ac6cdeb5a6ae021dd0a4f8c1168ea9f18bad1e20c860ad152e44

    • SSDEEP

      393216:4/fa9mzKJHhjartAm8toAx13bvoYN7NL+u4:4im+5h1tos13bvoYN7NKu4

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks