General

  • Target

    no_dropper.apk

  • Size

    3.5MB

  • Sample

    250107-z1kw5s1jhl

  • MD5

    4defa7e71f97180dd679875060b2188a

  • SHA1

    351c7ed45a11b9fea142c40484d51b56a7084061

  • SHA256

    fde931224d2e558e67ac8c9c0c1d0aac4f7562622a67870d6c3024bdeb851676

  • SHA512

    53e7d453799ca9457bafa0643c6fa36f6f2095a81f081286c714545084328bdc5b3f7e23c511465f5886689bbb673f7ef4646287b76c1021eab226d24f31f6d3

  • SSDEEP

    98304:21y8VlJ8f7H8/jRRb4A1RtZLrqOfLDcjzm:ay8V38zH8PbptZL3zDc/m

Malware Config

Targets

    • Target

      no_dropper.apk

    • Size

      3.5MB

    • MD5

      4defa7e71f97180dd679875060b2188a

    • SHA1

      351c7ed45a11b9fea142c40484d51b56a7084061

    • SHA256

      fde931224d2e558e67ac8c9c0c1d0aac4f7562622a67870d6c3024bdeb851676

    • SHA512

      53e7d453799ca9457bafa0643c6fa36f6f2095a81f081286c714545084328bdc5b3f7e23c511465f5886689bbb673f7ef4646287b76c1021eab226d24f31f6d3

    • SSDEEP

      98304:21y8VlJ8f7H8/jRRb4A1RtZLrqOfLDcjzm:ay8V38zH8PbptZL3zDc/m

    Score
    7/10
    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks