General

  • Target

    sas-zombie-assault-4-2-0-2.apk

  • Size

    117.2MB

  • Sample

    241120-c7q1eaymhs

  • MD5

    bf37f285afd358ff563f2f03b6ad524f

  • SHA1

    b1a3b5f521bd55f92fb58d87818a27127279a9f8

  • SHA256

    61d73e08e6b26bbff1a2619a940fb0e22d0d7a0c1c5606982a99636b68abc259

  • SHA512

    d33c717f3f793084976c5ab63abbaa643d125afd41aea138e3837060e1e53f99080a5d2cf0032fdc0a24c910d9d20f787efd05ce9cca35e620f667064c0582fe

  • SSDEEP

    3145728:VlzSoPk2HTsh/EeB7VdbBBEebD0uSB+t4UgIK11eL3Z:jz5LHTsOi7V5B2qfHg9Dy

Malware Config

Targets

    • Target

      sas-zombie-assault-4-2-0-2.apk

    • Size

      117.2MB

    • MD5

      bf37f285afd358ff563f2f03b6ad524f

    • SHA1

      b1a3b5f521bd55f92fb58d87818a27127279a9f8

    • SHA256

      61d73e08e6b26bbff1a2619a940fb0e22d0d7a0c1c5606982a99636b68abc259

    • SHA512

      d33c717f3f793084976c5ab63abbaa643d125afd41aea138e3837060e1e53f99080a5d2cf0032fdc0a24c910d9d20f787efd05ce9cca35e620f667064c0582fe

    • SSDEEP

      3145728:VlzSoPk2HTsh/EeB7VdbBBEebD0uSB+t4UgIK11eL3Z:jz5LHTsOi7V5B2qfHg9Dy

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks