General
-
Target
2936207e-6d88-4986-881a-549cfb937563_oogleWebBrowserAndroid.apk
-
Size
12.1MB
-
Sample
241012-rnfgwsvcrf
-
MD5
d0d130c855a790da28fdd744535ef07f
-
SHA1
e9760321509f198ffd80667cc8fa34c4c76f4cc7
-
SHA256
e6746d0069dea77ecd1d7a611c45e5af220643c23f7b473e1bc2ed8aa2923475
-
SHA512
e6a08e435d5ea53de01c765c7747e2bcfea9dc99e67ac4e8b5d5cdfd7f07894e9554b04aca9d0310a7cc09b180bfa84f7e9192c03e79ae8f664a230a740a2a5f
-
SSDEEP
196608:wvyd7pyOZgwi70nk6zLxs1yuyc3u4Ly3UUnKEO++lUU4tjBZPqECEtZWk:wvi7E4gh0k6z2UHc3u4GnKA+lUx
Behavioral task
behavioral1
Sample
2936207e-6d88-4986-881a-549cfb937563_oogleWebBrowserAndroid.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
2936207e-6d88-4986-881a-549cfb937563_oogleWebBrowserAndroid.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
2936207e-6d88-4986-881a-549cfb937563_oogleWebBrowserAndroid.apk
-
Size
12.1MB
-
MD5
d0d130c855a790da28fdd744535ef07f
-
SHA1
e9760321509f198ffd80667cc8fa34c4c76f4cc7
-
SHA256
e6746d0069dea77ecd1d7a611c45e5af220643c23f7b473e1bc2ed8aa2923475
-
SHA512
e6a08e435d5ea53de01c765c7747e2bcfea9dc99e67ac4e8b5d5cdfd7f07894e9554b04aca9d0310a7cc09b180bfa84f7e9192c03e79ae8f664a230a740a2a5f
-
SSDEEP
196608:wvyd7pyOZgwi70nk6zLxs1yuyc3u4Ly3UUnKEO++lUU4tjBZPqECEtZWk:wvi7E4gh0k6z2UHc3u4GnKA+lUx
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
4System Checks
4