Resubmissions

09-11-2024 09:52

241109-lv8t5asdng 8

26-10-2024 03:43

241026-d95r1syhpd 8

General

  • Target

    HappyMod-3-1-4.apk

  • Size

    17.4MB

  • Sample

    241026-d95r1syhpd

  • MD5

    dc0c437d3e8bc12854a3a2855b01db93

  • SHA1

    604a6d22c2e4397b3cb0dce0cab8f988a686957a

  • SHA256

    a65d4a556b91c2d36e11835ca26bc1b84b0a71ad45bb5892d07fce2700ce9290

  • SHA512

    d781c21e64b469ff52df81b438e2f7c2e22a1c13be212106a217782882deab2d8fc5b602a2654f7d10dbd39a5fbd1302bb8fb4a28ef21baa14aa305f47567563

  • SSDEEP

    393216:lp0TcbMT8ihcEb7NCfRVi+DiWpNyfiDKFeIu9sprsnuMWTtnP:lacQThcEk5p40KFNUsprsuMWZP

Malware Config

Targets

    • Target

      HappyMod-3-1-4.apk

    • Size

      17.4MB

    • MD5

      dc0c437d3e8bc12854a3a2855b01db93

    • SHA1

      604a6d22c2e4397b3cb0dce0cab8f988a686957a

    • SHA256

      a65d4a556b91c2d36e11835ca26bc1b84b0a71ad45bb5892d07fce2700ce9290

    • SHA512

      d781c21e64b469ff52df81b438e2f7c2e22a1c13be212106a217782882deab2d8fc5b602a2654f7d10dbd39a5fbd1302bb8fb4a28ef21baa14aa305f47567563

    • SSDEEP

      393216:lp0TcbMT8ihcEb7NCfRVi+DiWpNyfiDKFeIu9sprsnuMWTtnP:lacQThcEk5p40KFNUsprsuMWZP

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks