General

  • Target

    Web_Video_Caster_v5.10.3_4916_Premium_Mod.apk

  • Size

    54.7MB

  • Sample

    241013-mvd57axcrr

  • MD5

    60e2e3594b0242b7445c529132ae6055

  • SHA1

    6ecdbb17f0c7bd62486819165e851bd2803acefd

  • SHA256

    987e26b71c09eabc3c3b9087532b28c90f6447075f94cebabaa36eca4e0e7bb8

  • SHA512

    78f3c782d2614604a0c4ea66cb26bc1f5ba1481336b73fd9555bc27feed93cc386c3e5de16ab9a11dd553475510291e26128cb08de1cc859bc152fd1d21a2c52

  • SSDEEP

    1572864:lRoNO4eA9yfThw6UlzJIxXl+djxE7JhZk:lRkN7ofe6U2MdeNhy

Malware Config

Targets

    • Target

      Web_Video_Caster_v5.10.3_4916_Premium_Mod.apk

    • Size

      54.7MB

    • MD5

      60e2e3594b0242b7445c529132ae6055

    • SHA1

      6ecdbb17f0c7bd62486819165e851bd2803acefd

    • SHA256

      987e26b71c09eabc3c3b9087532b28c90f6447075f94cebabaa36eca4e0e7bb8

    • SHA512

      78f3c782d2614604a0c4ea66cb26bc1f5ba1481336b73fd9555bc27feed93cc386c3e5de16ab9a11dd553475510291e26128cb08de1cc859bc152fd1d21a2c52

    • SSDEEP

      1572864:lRoNO4eA9yfThw6UlzJIxXl+djxE7JhZk:lRkN7ofe6U2MdeNhy

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks