General

  • Target

    增强-小黄人.apk

  • Size

    4.9MB

  • Sample

    241121-gzttjstnfj

  • MD5

    cc18899e6067c6f5310cf0556bf67d5c

  • SHA1

    5a0738b65765d9f6c34544377ad0ded3d935d8b1

  • SHA256

    4ce498dfefeb83ed62364e76171343750c44bf1ee9b0626ba4ff0a7e6443948d

  • SHA512

    6aa3f081f893d554855a19f1843e1591261ad58b83c8943ecd98633f1c00b574856fcfc61d53c52f5842419ed9b790c63b4aba82da4ca8b66f31a72f95b21ed9

  • SSDEEP

    98304:KXT+BxGtLuLaZkn8VYo6vbdoWaHO5RWEqgEVY+IDAlQxXv1PYRgR:KXT+CtLuLnIYZdvaHF1gXv1KgR

Malware Config

Targets

    • Target

      增强-小黄人.apk

    • Size

      4.9MB

    • MD5

      cc18899e6067c6f5310cf0556bf67d5c

    • SHA1

      5a0738b65765d9f6c34544377ad0ded3d935d8b1

    • SHA256

      4ce498dfefeb83ed62364e76171343750c44bf1ee9b0626ba4ff0a7e6443948d

    • SHA512

      6aa3f081f893d554855a19f1843e1591261ad58b83c8943ecd98633f1c00b574856fcfc61d53c52f5842419ed9b790c63b4aba82da4ca8b66f31a72f95b21ed9

    • SSDEEP

      98304:KXT+BxGtLuLaZkn8VYo6vbdoWaHO5RWEqgEVY+IDAlQxXv1PYRgR:KXT+CtLuLnIYZdvaHF1gXv1KgR

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks