General

  • Target

    8 Ball Pool 55.4.2.apk

  • Size

    120.9MB

  • Sample

    241012-25dpqs1arj

  • MD5

    af99ef224c3932c11bde6d7e203ae3f1

  • SHA1

    d9327e1f750e445818c4715797213ccac38f2483

  • SHA256

    75428f3aa30d79d981d7536db40b79239587a2496f2d3b2b71b05de81dcc86f6

  • SHA512

    6fa052f0157d59f26a4e03d5a74f5a4aa6e068eaee1c2952d9b4ba8648bbdd25bb501fc3748809a9937db202ad4e6bf9d941e1116867684ae2a529ff67bf9e21

  • SSDEEP

    3145728:B/HP2Dkjb+VWX1Kv/Iu5Nw2LzTfqX/D0MaZF:QEsISNZLzTfqXrFg

Malware Config

Targets

    • Target

      8 Ball Pool 55.4.2.apk

    • Size

      120.9MB

    • MD5

      af99ef224c3932c11bde6d7e203ae3f1

    • SHA1

      d9327e1f750e445818c4715797213ccac38f2483

    • SHA256

      75428f3aa30d79d981d7536db40b79239587a2496f2d3b2b71b05de81dcc86f6

    • SHA512

      6fa052f0157d59f26a4e03d5a74f5a4aa6e068eaee1c2952d9b4ba8648bbdd25bb501fc3748809a9937db202ad4e6bf9d941e1116867684ae2a529ff67bf9e21

    • SSDEEP

      3145728:B/HP2Dkjb+VWX1Kv/Iu5Nw2LzTfqX/D0MaZF:QEsISNZLzTfqXrFg

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks