General

  • Target

    ready.apk

  • Size

    9.3MB

  • Sample

    241123-xjwk7s1kaz

  • MD5

    655ae92a7d427d1b88de0d482d1c6a66

  • SHA1

    c98a1ad2d2d108d0e05ff3dba907a3adb255581f

  • SHA256

    91350c09597c59ee74169cb9703874a9715af51a62d8d9e4e7a9b5f3a6549a50

  • SHA512

    ffaf34a8d7d52ac90147b236827d9e0fcc589035c5b11ad7be783a5536b4bd2d9884609498c66a34a82a9f13b155f6db42b2e3a71f76f5df3f95da6272b7ab18

  • SSDEEP

    98304:qWfQVwR84QVe/5kORCrU7cjxhIPFBdmz5zBOTS0tlSJDE:W884QVS56FjWHwzaRX

Malware Config

Targets

    • Target

      ready.apk

    • Size

      9.3MB

    • MD5

      655ae92a7d427d1b88de0d482d1c6a66

    • SHA1

      c98a1ad2d2d108d0e05ff3dba907a3adb255581f

    • SHA256

      91350c09597c59ee74169cb9703874a9715af51a62d8d9e4e7a9b5f3a6549a50

    • SHA512

      ffaf34a8d7d52ac90147b236827d9e0fcc589035c5b11ad7be783a5536b4bd2d9884609498c66a34a82a9f13b155f6db42b2e3a71f76f5df3f95da6272b7ab18

    • SSDEEP

      98304:qWfQVwR84QVe/5kORCrU7cjxhIPFBdmz5zBOTS0tlSJDE:W884QVS56FjWHwzaRX

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Locks the device screen

      Application may abuse the framework's APIs to lock the legitimate user out of the device.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the content of the call log.

    • Acquires the wake lock

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks