General

  • Target

    Union_Credit_Card[1].apk

  • Size

    4.5MB

  • Sample

    241120-ge1flaxjhq

  • MD5

    ad109964f6d68bfecce5db1c6c6a21fc

  • SHA1

    87f39addd11c6f8f3b934bcedcf325081f7dfb95

  • SHA256

    ff0312c258ad74316d1811703cdfded4ae4dfbf841aacf1150558c71e5b0613b

  • SHA512

    9999db0e1810ffa2af27e7018401ba3ceb8c669e86d443c579f2be30905594f0e9f55a7c83d4c3e243cf381811c3b41b7b10d60831ab11fd8235ce725f5fae7d

  • SSDEEP

    98304:BzDgDFqdaWlMUxz8fwuGJLjdIwLetTd8h0qbXREjjqfWmGZTWqmPNfre9v:tXaQMS8fwXJjdxe3wfm/qfWmGpWlC

Malware Config

Targets

    • Target

      Union_Credit_Card[1].apk

    • Size

      4.5MB

    • MD5

      ad109964f6d68bfecce5db1c6c6a21fc

    • SHA1

      87f39addd11c6f8f3b934bcedcf325081f7dfb95

    • SHA256

      ff0312c258ad74316d1811703cdfded4ae4dfbf841aacf1150558c71e5b0613b

    • SHA512

      9999db0e1810ffa2af27e7018401ba3ceb8c669e86d443c579f2be30905594f0e9f55a7c83d4c3e243cf381811c3b41b7b10d60831ab11fd8235ce725f5fae7d

    • SSDEEP

      98304:BzDgDFqdaWlMUxz8fwuGJLjdIwLetTd8h0qbXREjjqfWmGZTWqmPNfre9v:tXaQMS8fwXJjdxe3wfm/qfWmGpWlC

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks