General

  • Target

    059f6cbc0ae85403ce53189724812a70b38ee3a2263802f48f977d4462e164b4

  • Size

    20.8MB

  • Sample

    250201-czfvga1maw

  • MD5

    96e77a35b4f5f9e9ef8c9280ca06800b

  • SHA1

    f53fe17f4493bc08faf4f5c796aa7a0b30ad4506

  • SHA256

    059f6cbc0ae85403ce53189724812a70b38ee3a2263802f48f977d4462e164b4

  • SHA512

    409d307637349b4fc284221bb5d14051dc55a1c7016f82cedd6a6c2c8e3adf516b2cab0a9ba3851aa943a51994e0f24db6cf57300d319c0e58c9d1de6dd9a1d5

  • SSDEEP

    393216:G6UKoU8+23isJA35z7A79L+ow71mbgafiubciZVbxT9i/zVN2I+TXRtkKpPbNiRB:RoA2NJA35z7c5SRmbBffc4Vri/zVN2IJ

Malware Config

Extracted

Family

andrmonitor

C2

https://anmon.name/mch.html

Targets

    • Target

      059f6cbc0ae85403ce53189724812a70b38ee3a2263802f48f977d4462e164b4

    • Size

      20.8MB

    • MD5

      96e77a35b4f5f9e9ef8c9280ca06800b

    • SHA1

      f53fe17f4493bc08faf4f5c796aa7a0b30ad4506

    • SHA256

      059f6cbc0ae85403ce53189724812a70b38ee3a2263802f48f977d4462e164b4

    • SHA512

      409d307637349b4fc284221bb5d14051dc55a1c7016f82cedd6a6c2c8e3adf516b2cab0a9ba3851aa943a51994e0f24db6cf57300d319c0e58c9d1de6dd9a1d5

    • SSDEEP

      393216:G6UKoU8+23isJA35z7A79L+ow71mbgafiubciZVbxT9i/zVN2I+TXRtkKpPbNiRB:RoA2NJA35z7c5SRmbBffc4Vri/zVN2IJ

    • AndrMonitor

      AndrMonitor is an Android stalkerware.

    • Andrmonitor family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks