General
-
Target
dropper.apk
-
Size
4.7MB
-
Sample
250107-ne23ra1jhj
-
MD5
ffff634146506b11adae437103dc15fc
-
SHA1
f70e96b4eb7d6dd2f1972ff1fb589097fd74844c
-
SHA256
bc95e8c80931ff2205c89f7d78fc96a1d0dc7c6f3c6ccb68f7e926143aa6e42e
-
SHA512
1a45fccbcee9a27bd2731ce99c00262808cf84521e7df3df87c3e3e89181404b869c4fe9a15ff05ff29f4894f8993fe1ec7758dd80e539fd96c45d428290445f
-
SSDEEP
98304:i3mUMdkaoLKauoeQtcPHeXqmr4fgfVeXwTjZn0Bft2n:i3mUEpauoeQ4HCxUfIbTjZo12n
Behavioral task
behavioral1
Sample
dropper.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
dropper.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
dropper.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
base.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
dropper.apk
-
Size
4.7MB
-
MD5
ffff634146506b11adae437103dc15fc
-
SHA1
f70e96b4eb7d6dd2f1972ff1fb589097fd74844c
-
SHA256
bc95e8c80931ff2205c89f7d78fc96a1d0dc7c6f3c6ccb68f7e926143aa6e42e
-
SHA512
1a45fccbcee9a27bd2731ce99c00262808cf84521e7df3df87c3e3e89181404b869c4fe9a15ff05ff29f4894f8993fe1ec7758dd80e539fd96c45d428290445f
-
SSDEEP
98304:i3mUMdkaoLKauoeQtcPHeXqmr4fgfVeXwTjZn0Bft2n:i3mUEpauoeQ4HCxUfIbTjZo12n
Score1/10 -
-
-
Target
base.apk
-
Size
3.5MB
-
MD5
d3dc0e8a0db31899df2a09e95041cd5a
-
SHA1
2e946eb2cdf0fe428b57dc72f20d0cbe23980a4f
-
SHA256
1c15920c729c30cb9fc758e7993515a006e2b86829a1136c5b2d875ae3a4e3e8
-
SHA512
157d0ddb9a88a518fdae71f10b3269cf9a3f245ae2b4727f932f777d49aa08e75ac9efda211433e2af86fb3a9deb91c35938d4b8cfe420f5c1bb4aaac32689a1
-
SSDEEP
98304:G1y8VlJ8Y7H8/jRRb4A1RtZLrqOfLDcjzg:Ky8V38eH8PbptZL3zDc/g
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
1System Network Configuration Discovery
1