General

  • Target

    Original_30fps.apk

  • Size

    42.4MB

  • Sample

    241001-w4zmxsxglc

  • MD5

    8399b3d7053b777fc48716967a703019

  • SHA1

    cbc8cbc6d75010ca92726301e03431cd16ce918e

  • SHA256

    656fc48d836e314302528bdb259922da8f7fc9ca5a843e4756d2e4fafd2bc8b8

  • SHA512

    880dd89d9f55734bcee0da1368ac7cd21437355ac6af70fdc0d56d97a6a463f35202d3e0487dff9df98d8a325fe7dfc12fa68fc6548f275debf0a5bc761eb1d2

  • SSDEEP

    786432:M8hw3J2Fy6h3q96kT5QCJT1kbfaX2U3JeR3AhP5bizvZjVKNdIa3ZLbVI4rM:Mt3o+zWCJTufaX28JeKIzlYlJHrM

Malware Config

Targets

    • Target

      Original_30fps.apk

    • Size

      42.4MB

    • MD5

      8399b3d7053b777fc48716967a703019

    • SHA1

      cbc8cbc6d75010ca92726301e03431cd16ce918e

    • SHA256

      656fc48d836e314302528bdb259922da8f7fc9ca5a843e4756d2e4fafd2bc8b8

    • SHA512

      880dd89d9f55734bcee0da1368ac7cd21437355ac6af70fdc0d56d97a6a463f35202d3e0487dff9df98d8a325fe7dfc12fa68fc6548f275debf0a5bc761eb1d2

    • SSDEEP

      786432:M8hw3J2Fy6h3q96kT5QCJT1kbfaX2U3JeR3AhP5bizvZjVKNdIa3ZLbVI4rM:Mt3o+zWCJTufaX28JeKIzlYlJHrM

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks