General

  • Target

    增强-ApplePay.apk

  • Size

    4.7MB

  • Sample

    241121-gs73layerb

  • MD5

    3b1f8a6e92271606ebae98726f26cd88

  • SHA1

    768dcb8745c9f7a01ab9dd9f7c7b02059b011d75

  • SHA256

    3b03ce13856931ae2235e39896e58f4e9f42ebbd851701ec5ad594dfd4eaa28d

  • SHA512

    08777ce9f6b706b5451e61928d4f00a8c363e3dc23052a26edc6b46a555d90cfdce5961267a2b33b07b615e6e007273766ddaa29f60ae7c718850f6490e0dbce

  • SSDEEP

    98304:TSTWL4ZLhlB/TysYPq6MJgx3j9umyrLMfVoG9TuccZ:TSTGml1ysYPqqx0m2IVoGMv

Malware Config

Targets

    • Target

      增强-ApplePay.apk

    • Size

      4.7MB

    • MD5

      3b1f8a6e92271606ebae98726f26cd88

    • SHA1

      768dcb8745c9f7a01ab9dd9f7c7b02059b011d75

    • SHA256

      3b03ce13856931ae2235e39896e58f4e9f42ebbd851701ec5ad594dfd4eaa28d

    • SHA512

      08777ce9f6b706b5451e61928d4f00a8c363e3dc23052a26edc6b46a555d90cfdce5961267a2b33b07b615e6e007273766ddaa29f60ae7c718850f6490e0dbce

    • SSDEEP

      98304:TSTWL4ZLhlB/TysYPq6MJgx3j9umyrLMfVoG9TuccZ:TSTGml1ysYPqqx0m2IVoGMv

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks