General

  • Target

    8bd1c057de789baea3d0acad35a4d1fd.bin

  • Size

    2.7MB

  • Sample

    241222-bvhb3axnhw

  • MD5

    f36916f982d01a57fa8386db32aa025f

  • SHA1

    0f3a3b5b62bf9c1c7a35eeb706b839e8ae7e024a

  • SHA256

    044f60cf9fa842073033081f2854874178510c5e6ebc9a4635cead3dcc12f5d3

  • SHA512

    daccc15e2dc5e16a8545cd135c466fbb55b22eb3bf30c7895bd8d2f9934a2be0a1c93236304b6900365a28b7348bd6cd2dd61234f637216ca1eb776fabfc2b66

  • SSDEEP

    49152:1zqySrrwcym0DadCDLp8v47jv9TK56AveMzFVRjzguhAdZq2vXoCksSQCSocfhzB:1S3itagD24f7cewZjzt2/qfnssSokhzB

Malware Config

Targets

    • Target

      377f07b92d33e0ea9d7cfe3c288e19df2be8555154bdb1141b82a87d068a0cf7.apk

    • Size

      3.7MB

    • MD5

      8bd1c057de789baea3d0acad35a4d1fd

    • SHA1

      09692ebecc03862c8223a43e0934fc7e1fa6c06f

    • SHA256

      377f07b92d33e0ea9d7cfe3c288e19df2be8555154bdb1141b82a87d068a0cf7

    • SHA512

      6d4c33afd728d8bdd9ec2ca69554efb3c21370b755812a27b4e5c24aae2e39577b5f0b4aa273ce9dab09b9421bd50c528cf25c6f438726211c757cd09396b738

    • SSDEEP

      98304:p1y8VfJ2nSi+s+OZm41gFvWMfz/L2ci5eR:Hy8Vx2ndLIWQT2cweR

    Score
    7/10
    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Mobile v15

Tasks