General

  • Target

    samp.apk

  • Size

    16.2MB

  • Sample

    241107-zqcssaxqd1

  • MD5

    642a742cac128ba998be27ea20fdb10b

  • SHA1

    bc9862f1f3a7d3ee8142b8bd401ea3bb12a3b00f

  • SHA256

    50404b238608281c6c1d5de7b453f7c7c93bfdd8fb9a063ce2712529a9265986

  • SHA512

    0776fdbc9ca75909212bc1ba36ae6eae440115dba327a7f64d981cdf1ecbf67af2be3744cde3fcf07c72e7e2b304ef94260911a3637e99383cc110aff1304649

  • SSDEEP

    393216:9J+hakmTKaSQB8g4HVsYQ4KJozhHU9G4uFvrR54mbU4ooddHBIIBvunF2isnpmEc:7mlmGFu8gI7Q4W6h0E4ajRugDoGdHBWN

Malware Config

Targets

    • Target

      samp.apk

    • Size

      16.2MB

    • MD5

      642a742cac128ba998be27ea20fdb10b

    • SHA1

      bc9862f1f3a7d3ee8142b8bd401ea3bb12a3b00f

    • SHA256

      50404b238608281c6c1d5de7b453f7c7c93bfdd8fb9a063ce2712529a9265986

    • SHA512

      0776fdbc9ca75909212bc1ba36ae6eae440115dba327a7f64d981cdf1ecbf67af2be3744cde3fcf07c72e7e2b304ef94260911a3637e99383cc110aff1304649

    • SSDEEP

      393216:9J+hakmTKaSQB8g4HVsYQ4KJozhHU9G4uFvrR54mbU4ooddHBIIBvunF2isnpmEc:7mlmGFu8gI7Q4W6h0E4ajRugDoGdHBWN

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks