General

  • Target

    05B4C4DD8BF9F376C767330E649D725AD35C0C9C3B1B2DBBFAB7F39E90C5BAC4.apk

  • Size

    24.1MB

  • Sample

    250217-pzvpvaypdt

  • MD5

    20119bda1b6c51fb1e14d9c14e0bca00

  • SHA1

    2af901160d51d4060b10721b7db958fce6813bc6

  • SHA256

    05b4c4dd8bf9f376c767330e649d725ad35c0c9c3b1b2dbbfab7f39e90c5bac4

  • SHA512

    7d3314d39c785c47a7ee9f029a11d1c3ab66786e77c7e3a8c31e95b2ce35513265bd686ef07f807e17836e488ddd618c5afed29c9fd78329bdfde52abbdc0384

  • SSDEEP

    786432:UTMyS8RbcSQTJwG6RV+oWOVzTZEBvD9WKLabY:KMyS4bpyJIoO1mBvgKLabY

Malware Config

Targets

    • Target

      05B4C4DD8BF9F376C767330E649D725AD35C0C9C3B1B2DBBFAB7F39E90C5BAC4.apk

    • Size

      24.1MB

    • MD5

      20119bda1b6c51fb1e14d9c14e0bca00

    • SHA1

      2af901160d51d4060b10721b7db958fce6813bc6

    • SHA256

      05b4c4dd8bf9f376c767330e649d725ad35c0c9c3b1b2dbbfab7f39e90c5bac4

    • SHA512

      7d3314d39c785c47a7ee9f029a11d1c3ab66786e77c7e3a8c31e95b2ce35513265bd686ef07f807e17836e488ddd618c5afed29c9fd78329bdfde52abbdc0384

    • SSDEEP

      786432:UTMyS8RbcSQTJwG6RV+oWOVzTZEBvD9WKLabY:KMyS4bpyJIoO1mBvgKLabY

    • Harly

      Harly is an Android trojan subscriber first seen in September 2022.

    • Harly family

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks