General

  • Target

    e1a0e5b8f02424e046d674e721cc6ded514c4131b61464d9a6115184d41181ee

  • Size

    69.0MB

  • Sample

    241119-p5g1ya1lfj

  • MD5

    694e52a59bd0552d404e8bcdf52ee7d4

  • SHA1

    f1d0dc6205f82b9e4c723698a7e9dadfd0d9148a

  • SHA256

    e1a0e5b8f02424e046d674e721cc6ded514c4131b61464d9a6115184d41181ee

  • SHA512

    bd5dea14c9f9a7fd9b83fb30e542a1072449d9b4b356ef39512a386cf49e53d41aa9c10267e8ca8edcb13dcdda7015bdeb4a30272803f7709cb3054a201fa870

  • SSDEEP

    1572864:TIbgU9BSqPO1vl1hrZWGh0pEAfvy4FYYdrkcJP0w:0SqPO193877vfFYYdrkcJH

Malware Config

Targets

    • Target

      e1a0e5b8f02424e046d674e721cc6ded514c4131b61464d9a6115184d41181ee

    • Size

      69.0MB

    • MD5

      694e52a59bd0552d404e8bcdf52ee7d4

    • SHA1

      f1d0dc6205f82b9e4c723698a7e9dadfd0d9148a

    • SHA256

      e1a0e5b8f02424e046d674e721cc6ded514c4131b61464d9a6115184d41181ee

    • SHA512

      bd5dea14c9f9a7fd9b83fb30e542a1072449d9b4b356ef39512a386cf49e53d41aa9c10267e8ca8edcb13dcdda7015bdeb4a30272803f7709cb3054a201fa870

    • SSDEEP

      1572864:TIbgU9BSqPO1vl1hrZWGh0pEAfvy4FYYdrkcJP0w:0SqPO193877vfFYYdrkcJH

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks