General

  • Target

    EvilRAT.apk

  • Size

    4.7MB

  • Sample

    241023-nzr4aazgmp

  • MD5

    366d8254219e5f54fcf664751cb70f5a

  • SHA1

    94a9105103f3f28dc75aa291bac1e080c74adadd

  • SHA256

    233e4cc416aa9e54253f46dedb1753eea4deaf03678038ff6ce88012ddb4dc7c

  • SHA512

    f136b9988873ce4837c0b1a5b0d4e2c3af921ede1ed14a0c81887ba62d37965fd71c0e047201ac041ce1a322df0fbe67770a162b5a619912516a70966bc18657

  • SSDEEP

    98304:Dlu+3vrlKLF+z22F/BXH6QKKGnU7GkmzSkzBFT50t+Z38q:Bu+MMz2UBaQKKGU7szSeWkR

Malware Config

Targets

    • Target

      EvilRAT.apk

    • Size

      4.7MB

    • MD5

      366d8254219e5f54fcf664751cb70f5a

    • SHA1

      94a9105103f3f28dc75aa291bac1e080c74adadd

    • SHA256

      233e4cc416aa9e54253f46dedb1753eea4deaf03678038ff6ce88012ddb4dc7c

    • SHA512

      f136b9988873ce4837c0b1a5b0d4e2c3af921ede1ed14a0c81887ba62d37965fd71c0e047201ac041ce1a322df0fbe67770a162b5a619912516a70966bc18657

    • SSDEEP

      98304:Dlu+3vrlKLF+z22F/BXH6QKKGnU7GkmzSkzBFT50t+Z38q:Bu+MMz2UBaQKKGU7szSeWkR

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks