General

  • Target

    ULoan-v102.apk

  • Size

    10.4MB

  • Sample

    241120-qyrr8sxcja

  • MD5

    6552ccfc688ecb1657932284691a9be2

  • SHA1

    2f565f53b45e2d4afbc734dc07a95e9b49d00bad

  • SHA256

    7e180b24b35090f82580f0928c753d3d3f52f1739b8f3d198886b1d9cc7ca61b

  • SHA512

    30eec78ff853f42086126e5a7c67a35fb87ccdbc93a3134e6534c644eccc710f129e2558a6fa971ca74cd10335723f7c617aa49b9841aa7f79778625d26ab711

  • SSDEEP

    196608:ARWx+i4phIdHRxMwhaI3nrfSiT7JboxLoAo8j149XvOzbUKqWHH8NOu0eHxacLfi:As+iXxRxMvqeiT7xoi6BIawKqmSOupx6

Malware Config

Targets

    • Target

      ULoan-v102.apk

    • Size

      10.4MB

    • MD5

      6552ccfc688ecb1657932284691a9be2

    • SHA1

      2f565f53b45e2d4afbc734dc07a95e9b49d00bad

    • SHA256

      7e180b24b35090f82580f0928c753d3d3f52f1739b8f3d198886b1d9cc7ca61b

    • SHA512

      30eec78ff853f42086126e5a7c67a35fb87ccdbc93a3134e6534c644eccc710f129e2558a6fa971ca74cd10335723f7c617aa49b9841aa7f79778625d26ab711

    • SSDEEP

      196608:ARWx+i4phIdHRxMwhaI3nrfSiT7JboxLoAo8j149XvOzbUKqWHH8NOu0eHxacLfi:As+iXxRxMvqeiT7xoi6BIawKqmSOupx6

    • Checks if the Android device is rooted.

    • Legitimate hosting services abused for malware hosting/C2

    • Queries the mobile country code (MCC)

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks