General

  • Target

    com-mod-calisteniapp-mod-apk-unlocked-pro-24-4-1-203.apk

  • Size

    91.2MB

  • Sample

    241122-3rgpxaykek

  • MD5

    73a31eac05c9c17f035dc2de7917d823

  • SHA1

    9426c793b32b7872a90108c662e97ab5e321696c

  • SHA256

    56dfd3efd8ec70ebabd4c3649163e928fa1201458c8a158dabe51d339c52dc61

  • SHA512

    4acfdab7cfc7716263fe15ee2b34b42766ab70c8d7cc9a2bb1ab00c22f3984201f1ca41680b596f4b4431e1ef101c6f9a8c737602b1d7b52a1dc0429a7618fbe

  • SSDEEP

    1572864:tA4/XB446A2LBAOL0+nyCv+9ndDwKn4WL5W+gEH/yERrhmU5FE://XBcA2Bivn4W7gGqpU5FE

Malware Config

Targets

    • Target

      com-mod-calisteniapp-mod-apk-unlocked-pro-24-4-1-203.apk

    • Size

      91.2MB

    • MD5

      73a31eac05c9c17f035dc2de7917d823

    • SHA1

      9426c793b32b7872a90108c662e97ab5e321696c

    • SHA256

      56dfd3efd8ec70ebabd4c3649163e928fa1201458c8a158dabe51d339c52dc61

    • SHA512

      4acfdab7cfc7716263fe15ee2b34b42766ab70c8d7cc9a2bb1ab00c22f3984201f1ca41680b596f4b4431e1ef101c6f9a8c737602b1d7b52a1dc0429a7618fbe

    • SSDEEP

      1572864:tA4/XB446A2LBAOL0+nyCv+9ndDwKn4WL5W+gEH/yERrhmU5FE://XBcA2Bivn4W7gGqpU5FE

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks