General

  • Target

    ca0989544a1511c773cf4f9da165e77a3be6d3b86a7b5484558b274ddc79a4b1.apk

  • Size

    1.1MB

  • Sample

    250327-jjmfms1mt4

  • MD5

    26f529d46558a35cd93b3f6dc85a213f

  • SHA1

    f3c68a5859d92d3048169dd28da19bb105aa0da5

  • SHA256

    ca0989544a1511c773cf4f9da165e77a3be6d3b86a7b5484558b274ddc79a4b1

  • SHA512

    56173d3d3ff48ef7a43428ae66a1187a83a2064d0cf3fdb6def5f917e9bc050998a347c131ee88b18750e8ce12689a46adad482e5f0735bba91bec93d024c5ed

  • SSDEEP

    24576:wqJONrJCTE3x0yCcmMvJO4kc1NWEz1T7hwRq4OaNF:wqJOlt3GyCivJoUII1HhQvOGF

Malware Config

Targets

    • Target

      ca0989544a1511c773cf4f9da165e77a3be6d3b86a7b5484558b274ddc79a4b1.apk

    • Size

      1.1MB

    • MD5

      26f529d46558a35cd93b3f6dc85a213f

    • SHA1

      f3c68a5859d92d3048169dd28da19bb105aa0da5

    • SHA256

      ca0989544a1511c773cf4f9da165e77a3be6d3b86a7b5484558b274ddc79a4b1

    • SHA512

      56173d3d3ff48ef7a43428ae66a1187a83a2064d0cf3fdb6def5f917e9bc050998a347c131ee88b18750e8ce12689a46adad482e5f0735bba91bec93d024c5ed

    • SSDEEP

      24576:wqJONrJCTE3x0yCcmMvJO4kc1NWEz1T7hwRq4OaNF:wqJOlt3GyCivJoUII1HhQvOGF

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks