General

  • Target

    base_beta (1).apk

  • Size

    385.8MB

  • Sample

    241110-c2g6bazrhm

  • MD5

    05cad727d957f7852fa201ab8a325951

  • SHA1

    71f5306093c57929849bcf26a10b3579f92cf818

  • SHA256

    f827ff2efe540ac07d2b4b38ad2142424e7a4f7fc4013a260b271d8dbf85fb91

  • SHA512

    e11b34447a9e6a83486051a59be739181cff79ade534479864b857b786bb63cd6ea021241f2f28e7834943b0227aa9681a59ba057386bee919eed259d0a0e629

  • SSDEEP

    6291456:OspSHVP2jCphUIDmnFZQteanPlvmtDZF1UW87cmT2mzHo0cYm/mh2:96VWCPEiPl+tDZOj9V0/m0

Malware Config

Targets

    • Target

      base_beta (1).apk

    • Size

      385.8MB

    • MD5

      05cad727d957f7852fa201ab8a325951

    • SHA1

      71f5306093c57929849bcf26a10b3579f92cf818

    • SHA256

      f827ff2efe540ac07d2b4b38ad2142424e7a4f7fc4013a260b271d8dbf85fb91

    • SHA512

      e11b34447a9e6a83486051a59be739181cff79ade534479864b857b786bb63cd6ea021241f2f28e7834943b0227aa9681a59ba057386bee919eed259d0a0e629

    • SSDEEP

      6291456:OspSHVP2jCphUIDmnFZQteanPlvmtDZF1UW87cmT2mzHo0cYm/mh2:96VWCPEiPl+tDZOj9V0/m0

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the content of photos stored on the user's device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks