General

  • Target

    c42c8dc8ec2f9adb1ad3511d721c8bb1564c62e5b7b37924a3741440035ee9c6.bin

  • Size

    3.6MB

  • Sample

    241104-1yzsysybjh

  • MD5

    b70f3dfdf3766c58e43aa3d3a13f1114

  • SHA1

    66cee7005a5549bf1c87b27dc654a685583ebbef

  • SHA256

    c42c8dc8ec2f9adb1ad3511d721c8bb1564c62e5b7b37924a3741440035ee9c6

  • SHA512

    d30b44b91a43b58b21fe661e22c0ffe5068f2460ee3d20424a2383a5c7ec363d026d50bf2e0d4bbef690ed7575b3bb84d81a54f87a0f38e2508ecc4bb84602b8

  • SSDEEP

    98304:wdO8Qj844FynsR8prR83RMGujqXsQ2n+aWJlz/9hO:D44qynZprR8mGqs9amU

Malware Config

Targets

    • Target

      c42c8dc8ec2f9adb1ad3511d721c8bb1564c62e5b7b37924a3741440035ee9c6.bin

    • Size

      3.6MB

    • MD5

      b70f3dfdf3766c58e43aa3d3a13f1114

    • SHA1

      66cee7005a5549bf1c87b27dc654a685583ebbef

    • SHA256

      c42c8dc8ec2f9adb1ad3511d721c8bb1564c62e5b7b37924a3741440035ee9c6

    • SHA512

      d30b44b91a43b58b21fe661e22c0ffe5068f2460ee3d20424a2383a5c7ec363d026d50bf2e0d4bbef690ed7575b3bb84d81a54f87a0f38e2508ecc4bb84602b8

    • SSDEEP

      98304:wdO8Qj844FynsR8prR83RMGujqXsQ2n+aWJlz/9hO:D44qynZprR8mGqs9amU

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the SMS messages.

    • Reads the content of the call log.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks