General

  • Target

    bba550ea8d9752e17c3da0ced80ec25fb5a1525f4194b708f2a6d9d7f0e58775.bin

  • Size

    4.6MB

  • Sample

    241220-1ybq5awjbk

  • MD5

    dab316524c7617bcc31307dae52343a0

  • SHA1

    eb7fe1307fb8c5b12086eb8f9ded4855c71be765

  • SHA256

    bba550ea8d9752e17c3da0ced80ec25fb5a1525f4194b708f2a6d9d7f0e58775

  • SHA512

    4fd002b990dac08132339a1024f9438e4889b94eaf7f14072f56e26f67159770974c6f172e5f5b493721d622a8a390209d4c505de42b69a1883204b75e09f9c0

  • SSDEEP

    98304:A+O1tjzBWTZmz+u30tL77cQRe5VrfA7jxfaTMaEnQ8I8x1Ggz:kisz+hH7tRenkjxBdLB

Malware Config

Targets

    • Target

      bba550ea8d9752e17c3da0ced80ec25fb5a1525f4194b708f2a6d9d7f0e58775.bin

    • Size

      4.6MB

    • MD5

      dab316524c7617bcc31307dae52343a0

    • SHA1

      eb7fe1307fb8c5b12086eb8f9ded4855c71be765

    • SHA256

      bba550ea8d9752e17c3da0ced80ec25fb5a1525f4194b708f2a6d9d7f0e58775

    • SHA512

      4fd002b990dac08132339a1024f9438e4889b94eaf7f14072f56e26f67159770974c6f172e5f5b493721d622a8a390209d4c505de42b69a1883204b75e09f9c0

    • SSDEEP

      98304:A+O1tjzBWTZmz+u30tL77cQRe5VrfA7jxfaTMaEnQ8I8x1Ggz:kisz+hH7tRenkjxBdLB

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks