General

  • Target

    rive.apk

  • Size

    69.6MB

  • Sample

    241103-zyhzrsvbrc

  • MD5

    af110486a396393a1746898a76f5f198

  • SHA1

    75aa25d2c62a8171bd58654e1a775b1205bcfbbb

  • SHA256

    6d32bc85030639e071cc1efc2943bdaa3d93a8e720e95aa2e8d919af2c42e3e4

  • SHA512

    c5a9e050b7666309e54e40b20d08f09b50567638e2bff5673da0ce17e20bd7bcc5b7125e520e92235fca311a03576ba109a82a93cdb8db80dd54f8b9f05bfa3b

  • SSDEEP

    786432:A1/JNdX/1mT4u4f2ZLVCeFm69FWBEwEtAuyb:CnhtmTyfSpZpWBEBNK

Malware Config

Targets

    • Target

      rive.apk

    • Size

      69.6MB

    • MD5

      af110486a396393a1746898a76f5f198

    • SHA1

      75aa25d2c62a8171bd58654e1a775b1205bcfbbb

    • SHA256

      6d32bc85030639e071cc1efc2943bdaa3d93a8e720e95aa2e8d919af2c42e3e4

    • SHA512

      c5a9e050b7666309e54e40b20d08f09b50567638e2bff5673da0ce17e20bd7bcc5b7125e520e92235fca311a03576ba109a82a93cdb8db80dd54f8b9f05bfa3b

    • SSDEEP

      786432:A1/JNdX/1mT4u4f2ZLVCeFm69FWBEwEtAuyb:CnhtmTyfSpZpWBEBNK

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks