General

  • Target

    inat-box-v13-rc2.apk

  • Size

    10.8MB

  • Sample

    241205-x5qbbavlbj

  • MD5

    9c6cae30bd0dccca546a60b36c36c0eb

  • SHA1

    b004c1554c34e88e5d773b354159246c261ae04f

  • SHA256

    b42069ac7eed7d2f4ea14971325d0e4dd7730732d868eaf0606142a5894e30d8

  • SHA512

    937d45c85de983673948545715afe90b27906c9f5b5152c34074d469cc11149c1de0bbbe92d970bbfe983cf5e9a4d8035c0dc18f8c16d531bf6f6199056a0e3d

  • SSDEEP

    196608:x6gVh4mcVyYZrRxNRR0GAetwwo1alPLFC1vhzqAkFcdgFsNmUP0ZFn:xLBSX0GEwZLYFhz9kFcdc8NM7

Malware Config

Targets

    • Target

      inat-box-v13-rc2.apk

    • Size

      10.8MB

    • MD5

      9c6cae30bd0dccca546a60b36c36c0eb

    • SHA1

      b004c1554c34e88e5d773b354159246c261ae04f

    • SHA256

      b42069ac7eed7d2f4ea14971325d0e4dd7730732d868eaf0606142a5894e30d8

    • SHA512

      937d45c85de983673948545715afe90b27906c9f5b5152c34074d469cc11149c1de0bbbe92d970bbfe983cf5e9a4d8035c0dc18f8c16d531bf6f6199056a0e3d

    • SSDEEP

      196608:x6gVh4mcVyYZrRxNRR0GAetwwo1alPLFC1vhzqAkFcdgFsNmUP0ZFn:xLBSX0GEwZLYFhz9kFcdc8NM7

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks