General

  • Target

    sportsfire1.0.5.apk

  • Size

    13.5MB

  • Sample

    241004-lecfzs1aqe

  • MD5

    b6fde0b885f3a6bfc1f30d1510ca487b

  • SHA1

    e580f5acabfdc7ec2fe2206d6b732500143c37c4

  • SHA256

    bddc0edd8a79c6ae0919cd52e038717066880d4dbbd0596c6023cedb0ea12018

  • SHA512

    52963aa087a511f10226c45a07b850eeea96255cd8d710cf3d22c0faf33efe107e9a169318a4f9068bee7406c5fe157ee9e5e24bd2995dfb1109215822451ae1

  • SSDEEP

    196608:lSXWiBe/AJWTZ3FfaPnPJq7eSbDmdKsBuDYAICzTnbGSAt5J87Hrrx+R5QeqFTKu:lSXU/A43bidKqu1j6S4J8zAhqqy

Malware Config

Targets

    • Target

      sportsfire1.0.5.apk

    • Size

      13.5MB

    • MD5

      b6fde0b885f3a6bfc1f30d1510ca487b

    • SHA1

      e580f5acabfdc7ec2fe2206d6b732500143c37c4

    • SHA256

      bddc0edd8a79c6ae0919cd52e038717066880d4dbbd0596c6023cedb0ea12018

    • SHA512

      52963aa087a511f10226c45a07b850eeea96255cd8d710cf3d22c0faf33efe107e9a169318a4f9068bee7406c5fe157ee9e5e24bd2995dfb1109215822451ae1

    • SSDEEP

      196608:lSXWiBe/AJWTZ3FfaPnPJq7eSbDmdKsBuDYAICzTnbGSAt5J87Hrrx+R5QeqFTKu:lSXU/A43bidKqu1j6S4J8zAhqqy

    • Checks if the Android device is rooted.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks