General

  • Target

    test.apk

  • Size

    8.1MB

  • Sample

    241107-rl2x4ssrc1

  • MD5

    03c49a3572d13053d3c564b2b3c97506

  • SHA1

    1ded708d53c143cffb6942422866dd135278450f

  • SHA256

    e71a32170c93f257acc7276a4b0cdca025568599eba2ef9a62e141e4327f551e

  • SHA512

    5ee920ef7006cb35435c2705557d564df5b6dc2ea0566cc386260cfb9e98ff9eb381ee63a77cc8e61b273101dd0ba1466dec9f2a127155e7411e9a69b9c9673b

  • SSDEEP

    196608:k9ViaBDdlkEAz/PcfQFwvYAmn8dcPoSidDFAtvcZDl4Rn8zTI3gQIBA:+vYR8gwvBxWPudDFAdSDl08CgVA

Malware Config

Targets

    • Target

      test.apk

    • Size

      8.1MB

    • MD5

      03c49a3572d13053d3c564b2b3c97506

    • SHA1

      1ded708d53c143cffb6942422866dd135278450f

    • SHA256

      e71a32170c93f257acc7276a4b0cdca025568599eba2ef9a62e141e4327f551e

    • SHA512

      5ee920ef7006cb35435c2705557d564df5b6dc2ea0566cc386260cfb9e98ff9eb381ee63a77cc8e61b273101dd0ba1466dec9f2a127155e7411e9a69b9c9673b

    • SSDEEP

      196608:k9ViaBDdlkEAz/PcfQFwvYAmn8dcPoSidDFAtvcZDl4Rn8zTI3gQIBA:+vYR8gwvBxWPudDFAdSDl08CgVA

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks