General

  • Target

    Hikari Anime 1.7.3+60.apk

  • Size

    59.9MB

  • Sample

    241002-fy8qmsyfll

  • MD5

    6aa184768ec65256b096b65d478b9df3

  • SHA1

    82c090d2c81bacb3b9a9378f475572348799019d

  • SHA256

    2853a10a2da6f3af0a1adc3d13b5ab100cea52196888e310e24f32bd5427d4b0

  • SHA512

    3b2ad2f00c395ee411c434f28abf54270cb11696973a13785cca73b2756668733cc3ffb98b70142c72e02aa790bcbeb9deab456ef435ad04e0707f2a0765822c

  • SSDEEP

    393216:1r5DRkiY9ccM3IAx66WdTWBEsFAk8aib27YzsUS47xX29qow2qesau2qTMJzXVn2:F5DRkiY9ct16ABE5usXAwZMRXz43

Malware Config

Targets

    • Target

      Hikari Anime 1.7.3+60.apk

    • Size

      59.9MB

    • MD5

      6aa184768ec65256b096b65d478b9df3

    • SHA1

      82c090d2c81bacb3b9a9378f475572348799019d

    • SHA256

      2853a10a2da6f3af0a1adc3d13b5ab100cea52196888e310e24f32bd5427d4b0

    • SHA512

      3b2ad2f00c395ee411c434f28abf54270cb11696973a13785cca73b2756668733cc3ffb98b70142c72e02aa790bcbeb9deab456ef435ad04e0707f2a0765822c

    • SSDEEP

      393216:1r5DRkiY9ccM3IAx66WdTWBEsFAk8aib27YzsUS47xX29qow2qesau2qTMJzXVn2:F5DRkiY9ct16ABE5usXAwZMRXz43

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks