General
-
Target
M-Pajak (1).apk
-
Size
22.1MB
-
Sample
250210-d7ah4a1kdz
-
MD5
d9828b6240c50cf0a2fe47177b2277d5
-
SHA1
32d732f41a12b8a91af60b9dba1442835d3a9661
-
SHA256
f618a2bd91effd1cb6295407d83f7e6580775b49bb08747c7a2c552ce99ae639
-
SHA512
151b9010918c7df69da6f4b80e2caf0bbb20b7d2cb2896b9b6b8a0c1e58ef6d286b92768c789d6b41f709ab643f91456afd06bfd6ed829184f6f24c082ab03ba
-
SSDEEP
196608:SxmSiQeqQTXH83vqJs1sgAXFNgI7a7YSu33Zu9yzhLrZdsnFphv1rnFphvwnFphD:SYSlbkH8fqss3FNgIuc9zhL9gY/+e/j
Behavioral task
behavioral1
Sample
M-Pajak (1).apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
M-Pajak (1).apk
-
Size
22.1MB
-
MD5
d9828b6240c50cf0a2fe47177b2277d5
-
SHA1
32d732f41a12b8a91af60b9dba1442835d3a9661
-
SHA256
f618a2bd91effd1cb6295407d83f7e6580775b49bb08747c7a2c552ce99ae639
-
SHA512
151b9010918c7df69da6f4b80e2caf0bbb20b7d2cb2896b9b6b8a0c1e58ef6d286b92768c789d6b41f709ab643f91456afd06bfd6ed829184f6f24c082ab03ba
-
SSDEEP
196608:SxmSiQeqQTXH83vqJs1sgAXFNgI7a7YSu33Zu9yzhLrZdsnFphv1rnFphvwnFphD:SYSlbkH8fqss3FNgIuc9zhL9gY/+e/j
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the SMS messages.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2