General

  • Target

    google_recovery_account.apk

  • Size

    59.6MB

  • Sample

    241120-3q44tawkhx

  • MD5

    ecb4c40dbffdef1156b276a8d5a5cd4b

  • SHA1

    da3f7faa9dcf3370359f862424ba03db89ae2b46

  • SHA256

    d72f569ecc854625ba50d00c1a11c8274ff9811e0f600fbf29f6ab82a9c12c3e

  • SHA512

    72d595e24d5da6cf03a0a9ec3c59459b528ef410e17578c2b10a3f44e5913959f77e1bcabf0215c05c4878e825f4a8db967ca428121133f532571ac2fa9f4180

  • SSDEEP

    1572864:W5VVZXLFMxCP2sml3WZo8hqIgT8bqUrjL+Tpp88YndA:2hv2ODLb7b+Tc8Yn+

Malware Config

Targets

    • Target

      google_recovery_account.apk

    • Size

      59.6MB

    • MD5

      ecb4c40dbffdef1156b276a8d5a5cd4b

    • SHA1

      da3f7faa9dcf3370359f862424ba03db89ae2b46

    • SHA256

      d72f569ecc854625ba50d00c1a11c8274ff9811e0f600fbf29f6ab82a9c12c3e

    • SHA512

      72d595e24d5da6cf03a0a9ec3c59459b528ef410e17578c2b10a3f44e5913959f77e1bcabf0215c05c4878e825f4a8db967ca428121133f532571ac2fa9f4180

    • SSDEEP

      1572864:W5VVZXLFMxCP2sml3WZo8hqIgT8bqUrjL+Tpp88YndA:2hv2ODLb7b+Tc8Yn+

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks