General

  • Target

    TickTick-v7.3.1.2-PREMIUM.apk

  • Size

    49.5MB

  • Sample

    240927-3fjecsxepa

  • MD5

    f8672716ce31d420336b649dba13bc05

  • SHA1

    ee54f791f956b98c11239f6aef1360fe3735345e

  • SHA256

    559623956d27873c98594d23542afb513278a34f3446e90de4f71c5368ffc37e

  • SHA512

    ef648f6485e1ebca270dc0f515a97a99912c96b655a9fad01bdc508703439426cbcceeb5c86a569e31277f16a9d412783d1d41675bd0c181ffc336c96068b2dd

  • SSDEEP

    786432:haaKkr2S0mj4AxZp+WjdYe3/g+g9hsKEEd3Qy3RrE73hTo+pJntmz4WGG:haaKkKvg4AxDNIn9hTE73hTJI

Malware Config

Targets

    • Target

      TickTick-v7.3.1.2-PREMIUM.apk

    • Size

      49.5MB

    • MD5

      f8672716ce31d420336b649dba13bc05

    • SHA1

      ee54f791f956b98c11239f6aef1360fe3735345e

    • SHA256

      559623956d27873c98594d23542afb513278a34f3446e90de4f71c5368ffc37e

    • SHA512

      ef648f6485e1ebca270dc0f515a97a99912c96b655a9fad01bdc508703439426cbcceeb5c86a569e31277f16a9d412783d1d41675bd0c181ffc336c96068b2dd

    • SSDEEP

      786432:haaKkr2S0mj4AxZp+WjdYe3/g+g9hsKEEd3Qy3RrE73hTo+pJntmz4WGG:haaKkKvg4AxDNIn9hTE73hTJI

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks