General

  • Target

    honeygain_app.apk

  • Size

    7.8MB

  • Sample

    241109-xp2z6szflc

  • MD5

    54f1720e26931ba3030cf042358d8eb7

  • SHA1

    6dbf3bc173c540ac5485a4342ddb2008f2088863

  • SHA256

    58674b3f79b2de24e0784220e65bac457de776dd44e64283a1332c6c00a35a63

  • SHA512

    9254faa4ec02a9aff93737b1d12dd4a2268485ef5cdf3e8a89f9c01a5ca797125fdf408a8439ba2532b85918694fe50db12c268377fdb2925acc11302712751f

  • SSDEEP

    98304:bYh3w3THD+f5hgYPcqK0wwJTbtjHPJMoBJCsaliytiFPEzvZaQgURsnTT/AcnsLN:bY7hgBSNhFQsOiekMFE3nT8cnNK

Malware Config

Targets

    • Target

      honeygain_app.apk

    • Size

      7.8MB

    • MD5

      54f1720e26931ba3030cf042358d8eb7

    • SHA1

      6dbf3bc173c540ac5485a4342ddb2008f2088863

    • SHA256

      58674b3f79b2de24e0784220e65bac457de776dd44e64283a1332c6c00a35a63

    • SHA512

      9254faa4ec02a9aff93737b1d12dd4a2268485ef5cdf3e8a89f9c01a5ca797125fdf408a8439ba2532b85918694fe50db12c268377fdb2925acc11302712751f

    • SSDEEP

      98304:bYh3w3THD+f5hgYPcqK0wwJTbtjHPJMoBJCsaliytiFPEzvZaQgURsnTT/AcnsLN:bY7hgBSNhFQsOiekMFE3nT8cnNK

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks