General
-
Target
M-Pajak.apk
-
Size
22.1MB
-
Sample
250201-h3mebawjeq
-
MD5
c4ed726c3d5668d29193c664dda421b3
-
SHA1
d1a667675e2c3c6f8ce851e73acf75bfcf638951
-
SHA256
4a6fe0fa75fce1fe0029a0dbbe4e0b263812b011dfb0ba509e52f7f480389acf
-
SHA512
6bf9ec9f47043c261c4eb03ed0a47d1b06644a2dfd5f6f36c1f39bbcc885c6ceb2c90b180a3cb10c05c324d11f54875c2c5a98c565d86c42f11d860640032f15
-
SSDEEP
196608:iHOLwtZ/1WYD4u0fNEjHz6hJs1sgAXFNgI7a7YSu33Zu9yzhLrZXsnFphv1rnFpL:qUc1W6KYgss3FNgIuc9zhL9WY/+enC
Behavioral task
behavioral1
Sample
M-Pajak.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
M-Pajak.apk
-
Size
22.1MB
-
MD5
c4ed726c3d5668d29193c664dda421b3
-
SHA1
d1a667675e2c3c6f8ce851e73acf75bfcf638951
-
SHA256
4a6fe0fa75fce1fe0029a0dbbe4e0b263812b011dfb0ba509e52f7f480389acf
-
SHA512
6bf9ec9f47043c261c4eb03ed0a47d1b06644a2dfd5f6f36c1f39bbcc885c6ceb2c90b180a3cb10c05c324d11f54875c2c5a98c565d86c42f11d860640032f15
-
SSDEEP
196608:iHOLwtZ/1WYD4u0fNEjHz6hJs1sgAXFNgI7a7YSu33Zu9yzhLrZXsnFphv1rnFpL:qUc1W6KYgss3FNgIuc9zhL9WY/+enC
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the SMS messages.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2