General

  • Target

    Petpooja_Captain_Order_V2.apk

  • Size

    31.4MB

  • Sample

    241119-p24qjawke1

  • MD5

    90f00507d295cea6ff3bd47f9d306505

  • SHA1

    215206b095ed61b4eba6ec88c152d7d6a8b1d237

  • SHA256

    98c1782513c61319519bee445543775e93fe490148bf27c4d441f7c107d20759

  • SHA512

    ce892294a0c760725d3ae89f6dfcb5966bf901b84f9c987af8ccf0efc9d53a233fd5e6b213d7be23283e2821eda6ac4920c43de4c8217e8893846a44b52defdf

  • SSDEEP

    786432:aoEobPseFWZc/3RDoSWDacPVPlssQHuNBT5Ntj9NysQchF0ClDu41iM:lbs+6SOacNPlsyl5TRNysfhFJ1u41iM

Malware Config

Targets

    • Target

      Petpooja_Captain_Order_V2.apk

    • Size

      31.4MB

    • MD5

      90f00507d295cea6ff3bd47f9d306505

    • SHA1

      215206b095ed61b4eba6ec88c152d7d6a8b1d237

    • SHA256

      98c1782513c61319519bee445543775e93fe490148bf27c4d441f7c107d20759

    • SHA512

      ce892294a0c760725d3ae89f6dfcb5966bf901b84f9c987af8ccf0efc9d53a233fd5e6b213d7be23283e2821eda6ac4920c43de4c8217e8893846a44b52defdf

    • SSDEEP

      786432:aoEobPseFWZc/3RDoSWDacPVPlssQHuNBT5Ntj9NysQchF0ClDu41iM:lbs+6SOacNPlsyl5TRNysfhFJ1u41iM

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks